From null at suse.de Thu Apr 3 12:30:32 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 03 Apr 2025 12:30:32 -0000 Subject: SUSE-SU-2025:1127-1: important: Security update for ghostscript Message-ID: <174368343282.7425.8378426230846813916@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2025:1127-1 Release Date: 2025-04-03T11:53:43Z Rating: important References: * bsc#1240075 * bsc#1240077 * bsc#1240080 * bsc#1240081 Cross-References: * CVE-2025-27831 * CVE-2025-27832 * CVE-2025-27835 * CVE-2025-27836 CVSS scores: * CVE-2025-27831 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27831 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27832 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27832 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27835 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27835 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27836 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2025-27836 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2025-27831: Fixed text buffer overflow in DOCXWRITE TXTWRITE device via long characters to devices/vector/doc_common.c (bsc#1240075) * CVE-2025-27832: Fixed compression buffer overflow in NPDL device for contrib/japanese/gdevnpdl.c (bsc#1240077) * CVE-2025-27835: Fixed buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c (bsc#1240080) * CVE-2025-27836: Fixed Print buffer overflow in BJ10V device in contrib/japanese/gdev10v.c (bsc#1240081) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1127=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1127=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1127=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1127=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1127=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1127=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Proxy 4.3 (x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27831.html * https://www.suse.com/security/cve/CVE-2025-27832.html * https://www.suse.com/security/cve/CVE-2025-27835.html * https://www.suse.com/security/cve/CVE-2025-27836.html * https://bugzilla.suse.com/show_bug.cgi?id=1240075 * https://bugzilla.suse.com/show_bug.cgi?id=1240077 * https://bugzilla.suse.com/show_bug.cgi?id=1240080 * https://bugzilla.suse.com/show_bug.cgi?id=1240081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:36 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 03 Apr 2025 12:30:36 -0000 Subject: SUSE-SU-2025:1126-1: important: Security update for tomcat Message-ID: <174368343696.7425.10843695392299335082@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:1126-1 Release Date: 2025-04-03T11:51:52Z Rating: important References: * bsc#1239302 * bsc#1239676 Cross-References: * CVE-2024-56337 * CVE-2025-24813 CVSS scores: * CVE-2024-56337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56337 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24813 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: * CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302) * Update to Tomcat 9.0.102 * Fixes: * launch with java 17 (bsc#1239676) * Catalina * Fix: Weak etags in the If-Range header should not match as strong etags are required. (remm) * Fix: When looking up class loader resources by resource name, the resource name should not start with '/'. If the resource name does start with '/', Tomcat is lenient and looks it up as if the '/' was not present. When the web application class loader was configured with external repositories and names starting with '/' were used for lookups, it was possible that cached 'not found' results could effectively hide lookup results using the correct resource name. (markt) * Fix: Enable the JNDIRealm to validate credentials provided to HttpServletRequest.login(String username, String password) when the realm is configured to use GSSAPI authentication. (markt) * Fix: Fix a bug in the JRE compatibility detection that incorrectly identified Java 19 and Java 20 as supporting Java 21 features. (markt) * Fix: Improve the checks for exposure to and protection against CVE-2024-56337 so that reflection is not used unless required. The checks for whether the file system is case sensitive or not have been removed. (markt) * Fix: Avoid scenarios where temporary files used for partial PUT would not be deleted. (remm) * Fix: 69602: Fix regression in releases from 12-2024 that were too strict and rejected weak etags in the If-Range header. (remm) * Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught exception introduced for the check for CVE-2024-56337. (remm) * Cluster * Add: 69598: Add detection of service account token changes to the KubernetesMembershipProvider implementation and reload the token if it changes. Based on a patch by Miroslav Jezbera. (markt) * Coyote * Fix: 69575: Avoid using compression if a response is already compressed using compress, deflate or zstd. (remm) * Update: Use Transfer-Encoding for compression rather than Content-Encoding if the client submits a TE header containing gzip. (remm) * Fix: Fix a race condition in the handling of HTTP/2 stream reset that could cause unexpected 500 responses. (markt) * Other * Add: Add makensis as an option for building the Installer for Windows on non-Windows platforms. (rjung/markt) * Update: Update Byte Buddy to 1.17.1. (markt) * Update: Update Checkstyle to 10.21.3. (markt) * Update: Update SpotBugs to 4.9.1. (markt) * Update: Update JSign to 7.1. (markt) * Add: Improvements to French translations. (remm) * Add: Improvements to Japanese translations by tak7iji. (markt) * Add: Add org.apache.juli.JsonFormatter to format log as one line JSON documents. (remm) * Update to Tomcat 9.0.99 * Catalina * Update: Add tableName configuration on the DataSourcePropertyStore that may be used by the WebDAV Servlet. (remm) * Update: Improve HTTP If headers processing according to RFC 9110. Based on pull request #796 by Chenjp. (remm/markt) * Update: Allow readOnly attribute configuration on the Resources element and allow configure the readOnly attribute value of the main resources. The attribute value will also be used by the default and WebDAV Servlets. (remm) * Fix: 69285: Optimise the creation of the parameter map for included requests. Based on sample code and test cases provided by John Engebretson. (markt) * Fix: 69527: Avoid rare cases where a cached resource could be set with 0 content length, or could be evicted immediately. (remm) * Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect requests without body for WebDAV LOCK and PROPFIND. (remm) * Fix: 69528: Add multi-release JAR support for the bloom archiveIndexStrategy of the Resources. (remm) * Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based on a patch submitted by Chenjp. (remm) * Add: Add a check to ensure that, if one or more web applications are potentially vulnerable to CVE-2024-56337, the JVM has been configured to protect against the vulnerability and to configure the JVM correctly if not. Where one or more web applications are potentially vulnerable to CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be confirmed that the JVM has been correctly configured, prevent the impacted web applications from starting. (markt) * Fix: Remove unused session to client map from CrawlerSessionManagerValve. Submitted by Brian Matzon. (remm) * Fix: When using the WebDAV servlet with serveSubpathOnly set to true, ensure that the destination for any requested WebDAV operation is also restricted to the sub-path. (markt) * Fix: Generate an appropriate Allow HTTP header when the Default servlet returns a 405 (method not allowed) response in response to a DELETE request because the target resource cannot be deleted. Pull request #802 provided by Chenjp. (markt) * Code: Refactor creation of RequestDispatcher instances so that the processing of the provided path is consistent with normal request processing. (markt) * Add: Add encodedReverseSolidusHandling and encodedSolidusHandling attributes to Context to provide control over the handling of the path used to created a RequestDispatcher. (markt) * Fix: Handle a potential NullPointerException after an IOException occurs on a non-container thread during asynchronous processing. (markt) * Fix: Enhance lifecycle of temporary files used by partial PUT. (remm) * Coyote * Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does not support. These settings are now silently ignored. (markt) * Fix: Avoid a rare NullPointerException when recycling the Http11InputBuffer. (markt) * Fix: Lower the log level to debug for logging an invalid socket channel when processing poller events for the NIO Connector as this may occur in normal usage. (markt) * Code: Clean-up references to the HTTP/2 stream once request processing has completed to aid GC and reduce the size of the HTTP/2 recycled request and response cache. (markt) * Add: Add a new Connector configuration attribute, encodedReverseSolidusHandling, to control how %5c sequences in URLs are handled. The default behaviour is unchanged (decode) keeping in mind that the allowBackslash attribute determines how the decoded URI is processed. (markt) * Fix: 69545: Improve CRLF skipping for the available method of the ChunkedInputFilter. (remm) * Fix: Improve the performance of repeated calls to getHeader(). Pull request #813 provided by Adwait Kumar Singh. (markt) * Fix: 69559: Ensure that the Java 24 warning regarding the use of sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code will be used. (markt) * Jasper * Fix: 69508: Correct a regression in the fix for 69382 that broke JSP include actions if both the page attribute and the body contained parameters. Pull request #803 provided by Chenjp. (markt) * Fix: 69521: Update the EL Parser to allow the full range of valid characters in an EL identifier as defined by the Java Language Specification. (markt) * Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch provided by John Engebretson. (markt) * Web applications * Add: Documentation. Expand the description of the security implications of setting mapperContextRootRedirectEnabled and/or mapperDirectoryRedirectEnabled to true. (markt) * Fix: Documentation. Better document the default for the truststoreProvider attribute of a SSLHostConfig element. (markt) * Other * Update: Update to Commons Daemon 1.4.1. (markt) * Update: Update the internal fork of Commons Pool to 2.12.1. (markt) * Update: Update Byte Buddy to 1.16.1. (markt) * Update: Update UnboundID to 7.0.2. (markt) * Update: Update Checkstyle to 10.21.2. (markt) * Update: Update SpotBugs to 4.9.0. (markt) * Add: Improvements to French translations. (remm) * Add: Improvements to Chinese translations by leeyazhou. (markt) * Add: Improvements to Japanese translations by tak7iji. (markt) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1126=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1126=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1126=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1126=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1126=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Manager Server 4.3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Enterprise Storage 7.1 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * openSUSE Leap 15.6 (noarch) * tomcat-javadoc-9.0.102-150200.78.1 * tomcat-lib-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-docs-webapp-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-embed-9.0.102-150200.78.1 * tomcat-jsvc-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56337.html * https://www.suse.com/security/cve/CVE-2025-24813.html * https://bugzilla.suse.com/show_bug.cgi?id=1239302 * https://bugzilla.suse.com/show_bug.cgi?id=1239676 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:41 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 03 Apr 2025 12:30:41 -0000 Subject: SUSE-SU-2025:1125-1: important: Security update for libxslt Message-ID: <174368344159.7425.3627163748192652586@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:1125-1 Release Date: 2025-04-03T11:50:13Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2023-40403: Fixed sensitive information disclosure during processing web content (bsc#1238591) * CVE-2024-55549: Fixed use-after-free in xsltGetInheritedNsList (bsc#1239637) * CVE-2025-24855: Fixed use-after-free in numbers.c (bsc#1239625) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1125=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1125=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1125=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1125=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1125=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1125=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1125=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1125=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1125=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1125=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1125=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * libxslt-devel-32bit-1.1.34-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxslt1-64bit-1.1.34-150400.3.6.1 * libxslt1-64bit-debuginfo-1.1.34-150400.3.6.1 * libxslt-devel-64bit-1.1.34-150400.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * openSUSE Leap 15.6 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * libxslt-devel-32bit-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Package Hub 15 15-SP6 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:25 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 03 Apr 2025 16:30:25 -0000 Subject: SUSE-SU-2025:1131-1: important: Security update for openvpn Message-ID: <174369782500.21454.4176573686344415746@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2025:1131-1 Release Date: 2025-04-03T13:10:02Z Rating: important References: * bsc#1235147 Cross-References: * CVE-2024-5594 CVSS scores: * CVE-2024-5594 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-5594 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-5594 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2024-5594: Fixed incorrect handling of null bytes and invalid characters in control messages (bsc#1235147) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1131=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1131=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1131=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1131=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1131=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1131=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-down-root-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-down-root-plugin-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5594.html * https://bugzilla.suse.com/show_bug.cgi?id=1235147 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 08:30:09 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 07 Apr 2025 08:30:09 -0000 Subject: SUSE-RU-2025:1150-1: moderate: Recommended update for apache-commons-io Message-ID: <174401460961.21179.14170281840096640361@smelt2.prg2.suse.org> # Recommended update for apache-commons-io Announcement ID: SUSE-RU-2025:1150-1 Release Date: 2025-04-07T07:47:48Z Rating: moderate References: * bsc#1231298 Cross-References: * CVE-2024-47554 CVSS scores: * CVE-2024-47554 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47554 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47554 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for apache-commons-io fixes the following issues: apache-commons-io was updated from version 2.15.1 to 2.18.0: * Key changes across versions: * Cleaner code and updated dependencies * Improved security when handling serialized data with the new safe deserialization feature * New features for advanced file and stream operations * Various bugs were fixed to improve reliability with fewer crashes and unexpected errors * For the full list of changes please consult the packaged RELEASE-NOTES.txt * Already fixed in previous version: * CVE-2024-47554: Untrusted input to XmlStreamReader can lead to uncontrolled resource consumption (bsc#1231298) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1150=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1150=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1150=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1150=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1150=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1150=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1150=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1150=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1150=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1150=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1150=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1150=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1150=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1150=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1150=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1150=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1150=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Manager Proxy 4.3 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Manager Server 4.3 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Enterprise Storage 7.1 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * openSUSE Leap 15.6 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * apache-commons-io-javadoc-2.18.0-150200.3.15.1 * Basesystem Module 15-SP6 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apache-commons-io-2.18.0-150200.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47554.html * https://bugzilla.suse.com/show_bug.cgi?id=1231298 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 16:30:08 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 07 Apr 2025 16:30:08 -0000 Subject: SUSE-RU-2025:1160-1: moderate: Recommended update for vim Message-ID: <174404340862.21454.2636761262401972167@smelt2.prg2.suse.org> # Recommended update for vim Announcement ID: SUSE-RU-2025:1160-1 Release Date: 2025-04-07T15:29:29Z Rating: moderate References: * bsc#1235751 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: vim was updated to 9.1.1176. Changes: * wrong indent when expanding multiple lines * inconsistent behaviour with exclusive selection and motion commands * filetype: ABNF files are not detected * [security]: overflow with 'nostartofline' and Ex command in tag file * wildmenu highlighting in popup can be improved * using global variable for get_insert()/get_lambda_name() * wrong flags passed down to nextwild() * mark '] wrong after copying text object * command-line auto-completion hard with wildmenu * diff: regression with multi-file diff blocks * [security]: code execution with tar.vim and special crafted tar files * $MYVIMDIR is set too late * completion popup not cleared in cmdline * preinsert requires bot "menu" and "menuone" to be set * Ctrl-Y does not work well with "preinsert" when completing items * $MYVIMDIR may not always be set * :verbose set has wrong file name with :compiler! * command completion wrong for input() * Mode message not cleared after :silent message * Vim9: not able to use autoload class accross scripts * build error on Haiku * Patch v9.1.1151 causes problems * too many strlen() calls in getchar.c * :hi completion may complete to wrong value * Unix Makefile does not support Brazilian lang for the installer * Vim9: finding imported scripts can be further improved * preview-window does not scroll correctly * Vim9: wrong context being used when evaluating class member * multi-line completion has wrong indentation for last line * no way to create raw strings from a blob * illegal memory access when putting a register * Misplaced comment in readfile() * filetype: m17ndb files are not detected * [fifo] is not displayed when editing a fifo * cmdline completion for :hi is too simplistic * ins_str() is inefficient by calling STRLEN() * Match highlighting marks a buffer region as changed * 'suffixesadd' doesn't work with multiple items * filetype: Guile init file not recognized * filetype: xkb files not recognized everywhere * Mark positions wrong after triggering multiline completion * potential out-of-memory issue in search.c * 'listchars' "precedes" is not drawn on Tabs. * missing out-of-memory test in buf_write() * patch 9.1.1119 caused a regression with imports * preinsert text is not cleaned up correctly * patch 9.1.1121 used a wrong way to handle enter * cannot loop through pum menu with multiline items * No test for 'listchars' "precedes" with double-width char * popup hi groups not falling back to defaults * too many strlen() calls in findfile.c * Enter does not insert newline with "noselect" * Vim9: Not able to use an autoloaded class from another autoloaded script * Vim9: super not supported in lambda expressions * [security]: use-after-free in str_to_reg() * enabling termguicolors automatically confuses users * Inconsistencies in get_next_or_prev_match() * Vim9: variable not found in transitive import * cmdexpand.c hard to read * 'smoothscroll' gets stuck with 'listchars' "eol" * cannot loop through completion menu with fuzzy * Vim9: no support for protected new() method * CI: using Ubuntu 22.04 Github runners * if_perl: still some compile errors with Perl 5.38 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1160=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1160=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1160=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1160=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1160=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1160=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1160=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1160=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1160=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1160=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1160=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1160=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1160=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1160=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1160=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1160=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1160=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1160=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Manager Proxy 4.3 (x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Manager Proxy 4.3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Manager Server 4.3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Enterprise Storage 7.1 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * vim-debugsource-9.1.1176-150000.5.72.1 * vim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-9.1.1176-150000.5.72.1 * gvim-9.1.1176-150000.5.72.1 * xxd-9.1.1176-150000.5.72.1 * vim-9.1.1176-150000.5.72.1 * gvim-debuginfo-9.1.1176-150000.5.72.1 * vim-small-debuginfo-9.1.1176-150000.5.72.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * vim-data-common-9.1.1176-150000.5.72.1 * vim-data-9.1.1176-150000.5.72.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235751 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 08:30:04 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 08 Apr 2025 08:30:04 -0000 Subject: SUSE-SU-2025:1164-1: important: Security update for giflib Message-ID: <174410100465.21454.15477069442705157821@smelt2.prg2.suse.org> # Security update for giflib Announcement ID: SUSE-SU-2025:1164-1 Release Date: 2025-04-08T07:03:34Z Rating: important References: * bsc#1240416 Cross-References: * CVE-2025-31344 CVSS scores: Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for giflib fixes the following issues: * CVE-2025-31344: Fixed a buffer overflow in function DumpScreen2RGB (bsc#1240416) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1164=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1164=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1164=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1164=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1164=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1164=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1164=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Proxy 4.3 (x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * giflib-debugsource-5.2.2-150000.4.16.1 * giflib-progs-debuginfo-5.2.2-150000.4.16.1 * giflib-devel-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * giflib-progs-5.2.2-150000.4.16.1 * openSUSE Leap 15.6 (x86_64) * libgif7-32bit-debuginfo-5.2.2-150000.4.16.1 * libgif7-32bit-5.2.2-150000.4.16.1 * giflib-devel-32bit-5.2.2-150000.4.16.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31344.html * https://bugzilla.suse.com/show_bug.cgi?id=1240416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 08:30:04 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 10 Apr 2025 08:30:04 -0000 Subject: SUSE-SU-2025:1193-1: moderate: Security update for apparmor Message-ID: <174427380428.21179.11921255106305761448@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1193-1 Release Date: 2025-04-10T08:01:52Z Rating: moderate References: * bsc#1234452 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for apparmor fixes the following issue: * Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1193=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1193=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1193=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1193=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1193=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1193=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1193=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1193=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1193=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1193=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1193=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1193=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * ruby-apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * ruby-apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (aarch64_ilp32) * pam_apparmor-64bit-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-64bit-3.0.4-150400.5.12.2 * libapparmor1-64bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-64bit-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Manager Proxy 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Proxy 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 08:30:08 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 10 Apr 2025 08:30:08 -0000 Subject: SUSE-RU-2025:1192-1: moderate: Recommended update for hwinfo Message-ID: <174427380863.21179.15330127403179692188@smelt2.prg2.suse.org> # Recommended update for hwinfo Announcement ID: SUSE-RU-2025:1192-1 Release Date: 2025-04-10T06:40:20Z Rating: moderate References: * bsc#1223330 * bsc#1239663 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for hwinfo fixes the following issues: * Avoid reporting of spurious usb storage devices (bsc#1223330) * Do not overdo usb device de-duplication (bsc#1239663) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1192=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1192=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1192=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1192=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1192=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1192=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1192=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1192=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1192=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1192=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1192=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1192=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Manager Proxy 4.3 (x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * hwinfo-devel-21.87-150400.3.15.1 * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-devel-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * hwinfo-debugsource-21.87-150400.3.15.1 * hwinfo-21.87-150400.3.15.1 * hwinfo-debuginfo-21.87-150400.3.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223330 * https://bugzilla.suse.com/show_bug.cgi?id=1239663 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 08:30:38 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 10 Apr 2025 08:30:38 -0000 Subject: SUSE-RU-2025:1191-1: moderate: Recommended update for supportutils Message-ID: <174427383865.21179.11451829221682682908@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:1191-1 Release Date: 2025-04-10T04:58:29Z Rating: moderate References: * bsc#1183663 * bsc#1193173 * bsc#1211547 * bsc#1213291 * bsc#1214713 * bsc#1216049 * bsc#1216146 * bsc#1216147 * bsc#1216150 * bsc#1216151 * bsc#1216228 * bsc#1216229 * bsc#1216230 * bsc#1216231 * bsc#1216232 * bsc#1216233 * bsc#1216241 * bsc#1216388 * bsc#1216522 * bsc#1216827 * bsc#1217287 * bsc#1218201 * bsc#1218282 * bsc#1218324 * bsc#1218812 * bsc#1218814 * bsc#1219241 * bsc#1219639 * bsc#1222021 * bsc#1222650 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1230371 * bsc#1231396 * bsc#1231423 * bsc#1231838 * bsc#1233726 * jsc#PED-11669 * jsc#PED-4456 * jsc#PED-4524 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains five features and has 38 fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Version update 3.2.10, bugfixing. * Collect firewalld configuration * Ignore tasks/threads to prevent collecting duplicate data (bsc#1230371). * openldap2_5 support for SLES (bsc#1231838). * Added dbus_info for dbus.txt (bsc#1222650). * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291, PED-8221). * Corrected display issues (bsc#1231396, bsc#1217287). * NFS takes too long, showmount times out (bsc#1231423). * Merged sle15 and master branches (bsc#1233726, PED-11669). * Extended scaling for performance (bsc#1214713). * Corrected SLE Micro version (bsc#1219241). * Check nvidida-persistenced state (bsc#1219639). * Corrected podman .ID error (bsc#1218812). * Remove duplicate non-root podman users (bsc#1218814). * Fixed smart disk error (bsc#1218282). * Fixed ipvsadm logic error (bsc#1218324). * Correctly detects Xen Dom0 (bsc#1218201). * Inhibit the conversion of port numbers to port names for network files. * powerpc: collect rtas_errd.log and lp_diag.log log files. * Get list of pam.d files. * Provides long listing for /etc/sssd/sssd.conf (bsc#1211547). * Optimize lsof usage (bsc#1183663). * Added mokutil commands for secureboot. * ipset - List entries for all sets. * Added nvme-stas configuration to nvme.txt (bsc#1216049). * Collects zypp history file (bsc#1216522). * Collect HA related rpm package versions in ha.txt * Change -x OPTION to really be exclude only * Fixed kernel and added user live patching (PED-4524). * Fixed plugins creating empty files (bsc#1216388). * Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173). * Added supportutils to current (PED-4456). * Changed config directory to /etc/supportutuils for all conf and header.txt (bsc#1216232). * Fixed supportconfig using external test command (bsc#1216150) and kdump, analyzevmcore errors (bsc#1216146). * Support has been removed for scplugin.rc, use supportconfig.rc (bsc#1216241). * Remove check_service function from supportconfig.rc (bsc#1216231). * Removed older versions of SLES_VER (bsc#1216147). * Added timed command to fs-files.txt (bsc#1216827). * Cron and At are replaced with systemd.timer (bsc#1216229). * Offers apparmor or selinux based on configuration (bsc#1216233). * Filted proc access errors (bsc#1216151). * Remove all SuSE-release references (bsc#1216228). * Remove references to /etc/init.d (bsc#1216230). * Add capability in supportconfig to insert configs in summary.xml from command line option (bsc#1222021). * file sanitizing improvement request for boot (bsc#1227127). * Add "read_values -s" output to supportconfig on s390x (bsc#1228265). * Usability enhancement for supportconfig (PED-8211). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1191=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1191=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1191=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1191=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1191=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1191=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1191=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1191=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1191=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1191=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1191=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1191=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1191=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1191=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1191=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1191=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1191=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1191=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1191=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1191=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1191=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1191=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1191=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1191=1 ## Package List: * openSUSE Leap 15.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro 5.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro 5.4 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro 5.5 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Manager Proxy 4.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Manager Retail Branch Server 4.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Manager Server 4.3 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Enterprise Storage 7.1 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro 5.1 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro 5.2 (noarch) * supportutils-3.2.10-150300.7.35.36.4 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * supportutils-3.2.10-150300.7.35.36.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1183663 * https://bugzilla.suse.com/show_bug.cgi?id=1193173 * https://bugzilla.suse.com/show_bug.cgi?id=1211547 * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1214713 * https://bugzilla.suse.com/show_bug.cgi?id=1216049 * https://bugzilla.suse.com/show_bug.cgi?id=1216146 * https://bugzilla.suse.com/show_bug.cgi?id=1216147 * https://bugzilla.suse.com/show_bug.cgi?id=1216150 * https://bugzilla.suse.com/show_bug.cgi?id=1216151 * https://bugzilla.suse.com/show_bug.cgi?id=1216228 * https://bugzilla.suse.com/show_bug.cgi?id=1216229 * https://bugzilla.suse.com/show_bug.cgi?id=1216230 * https://bugzilla.suse.com/show_bug.cgi?id=1216231 * https://bugzilla.suse.com/show_bug.cgi?id=1216232 * https://bugzilla.suse.com/show_bug.cgi?id=1216233 * https://bugzilla.suse.com/show_bug.cgi?id=1216241 * https://bugzilla.suse.com/show_bug.cgi?id=1216388 * https://bugzilla.suse.com/show_bug.cgi?id=1216522 * https://bugzilla.suse.com/show_bug.cgi?id=1216827 * https://bugzilla.suse.com/show_bug.cgi?id=1217287 * https://bugzilla.suse.com/show_bug.cgi?id=1218201 * https://bugzilla.suse.com/show_bug.cgi?id=1218282 * https://bugzilla.suse.com/show_bug.cgi?id=1218324 * https://bugzilla.suse.com/show_bug.cgi?id=1218812 * https://bugzilla.suse.com/show_bug.cgi?id=1218814 * https://bugzilla.suse.com/show_bug.cgi?id=1219241 * https://bugzilla.suse.com/show_bug.cgi?id=1219639 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222650 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1230371 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1231838 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-4456 * https://jira.suse.com/browse/PED-4524 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 16:31:10 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 10 Apr 2025 16:31:10 -0000 Subject: SUSE-SU-2025:1195-1: important: Security update for the Linux Kernel Message-ID: <174430267084.4671.4710473973294270779@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1195-1 Release Date: 2025-04-10T13:48:07Z Rating: important References: * bsc#1193629 * bsc#1197227 * bsc#1207034 * bsc#1207186 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1210647 * bsc#1213167 * bsc#1225742 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1233558 * bsc#1234464 * bsc#1235528 * bsc#1237029 * bsc#1237530 * bsc#1237875 * bsc#1237877 * bsc#1237890 * bsc#1237918 * bsc#1238911 * bsc#1238919 * bsc#1239016 * bsc#1239036 * bsc#1239061 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240195 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 Cross-References: * CVE-2017-5753 * CVE-2021-4454 * CVE-2022-1016 * CVE-2022-49053 * CVE-2022-49293 * CVE-2022-49465 * CVE-2022-49650 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53064 * CVE-2024-56651 * CVE-2024-58083 * CVE-2025-21693 * CVE-2025-21714 * CVE-2025-21732 * CVE-2025-21753 * CVE-2025-21772 * CVE-2025-21839 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 62 vulnerabilities and has 14 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890). * CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * gfs2: Fix inode height consistency check (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195). * net: mana: Support holes in device list reply msg (bsc#1240133). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1195=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1195=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1195=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1195=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1195=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1195=1 ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (noarch) * kernel-macros-5.14.21-150400.24.161.1 * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-source-vanilla-5.14.21-150400.24.161.1 * kernel-docs-html-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150400.24.161.1 * kernel-debug-debuginfo-5.14.21-150400.24.161.1 * kernel-debug-devel-5.14.21-150400.24.161.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.161.1 * kernel-kvmsmall-devel-5.14.21-150400.24.161.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-base-rebuild-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kselftests-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-optional-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-obs-qa-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-extra-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * gfs2-kmp-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64) * dtb-cavium-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * dtb-altera-5.14.21-150400.24.161.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.161.1 * dtb-freescale-5.14.21-150400.24.161.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * dtb-arm-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-amazon-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-64kb-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-mediatek-5.14.21-150400.24.161.1 * dtb-apm-5.14.21-150400.24.161.1 * kernel-64kb-extra-5.14.21-150400.24.161.1 * dtb-apple-5.14.21-150400.24.161.1 * dtb-qcom-5.14.21-150400.24.161.1 * dtb-hisilicon-5.14.21-150400.24.161.1 * dtb-amd-5.14.21-150400.24.161.1 * dtb-lg-5.14.21-150400.24.161.1 * dtb-socionext-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-xilinx-5.14.21-150400.24.161.1 * dtb-broadcom-5.14.21-150400.24.161.1 * dtb-nvidia-5.14.21-150400.24.161.1 * dtb-exynos-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-optional-5.14.21-150400.24.161.1 * dtb-renesas-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-sprd-5.14.21-150400.24.161.1 * dtb-amlogic-5.14.21-150400.24.161.1 * dtb-rockchip-5.14.21-150400.24.161.1 * dtb-marvell-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-5.14.21-150400.24.161.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-allwinner-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21839.html * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239061 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240195 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 11 08:30:12 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 11 Apr 2025 08:30:12 -0000 Subject: SUSE-RU-2025:1197-1: low: Recommended update for scap-security-guide Message-ID: <174436021225.29196.2442917607659196180@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2025:1197-1 Release Date: 2025-04-10T20:45:48Z Rating: low References: * jsc#ECO-3319 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: his update for scap-security-guide fixes the following issues: * updated to 0.1.76 (jsc#ECO-3319) * Add new product for Ubuntu 24.04 and draft CIS profiles * Add pyproject.toml for the ssg package * AlmaLinux OS 9 as a new product * Documentation for ssg library * Extend SSG library to more easily collect profile selections * Extend SSG with functions to manage variables ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1197=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1197=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1197=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1197=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1197=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1197=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1197=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1197=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1197=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1197=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1197=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1197=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1197=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1197=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1197=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1197=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1197=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1197=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1197=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1197=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1197=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1197=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1197=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1197=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1197=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1197=1 ## Package List: * openSUSE Leap 15.6 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * Basesystem Module 15-SP6 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Manager Proxy 4.3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Manager Server 4.3 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Enterprise Storage 7.1 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * scap-security-guide-debian-0.1.76-150000.1.92.1 * scap-security-guide-ubuntu-0.1.76-150000.1.92.1 * scap-security-guide-redhat-0.1.76-150000.1.92.1 * scap-security-guide-0.1.76-150000.1.92.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 11 12:30:10 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 11 Apr 2025 12:30:10 -0000 Subject: SUSE-SU-2025:1201-1: important: Security update for expat Message-ID: <174437461000.19639.8452849672369239598@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:1201-1 Release Date: 2025-04-11T10:16:48Z Rating: important References: * bsc#1239618 * jsc#PED-12500 * jsc#SLE-21253 Cross-References: * CVE-2024-8176 CVSS scores: * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused by stack overflow by resolving use of recursion (bsc#1239618) Other fixes: \- version update to 2.7.1 (jsc#PED-12500) Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: \- XML_GetCurrentByteCount \- XML_GetCurrentByteIndex \- XML_GetCurrentColumnNumber \- XML_GetCurrentLineNumber \- XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self- certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re- enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives * version update to 2.7.0 #935 #937 Autotools: Make generated CMake files look for libexpat. at SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1201=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1201=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1201=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1201=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1201=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1201=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1201=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1201=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1201=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1201=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1201=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1201=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1201=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1201=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1201=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1201=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * Basesystem Module 15-SP6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Proxy 4.3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Manager Server 4.3 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libexpat-devel-64bit-2.7.1-150400.3.28.1 * libexpat1-64bit-2.7.1-150400.3.28.1 * libexpat1-64bit-debuginfo-2.7.1-150400.3.28.1 * expat-64bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * openSUSE Leap 15.6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/PED-12500 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:33 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 14 Apr 2025 08:30:33 -0000 Subject: SUSE-RU-2025:1217-1: important: Recommended update for ca-certificates-mozilla Message-ID: <174461943389.29196.3909760670653131399@smelt2.prg2.suse.org> # Recommended update for ca-certificates-mozilla Announcement ID: SUSE-RU-2025:1217-1 Release Date: 2025-04-13T10:17:39Z Rating: important References: * bsc#1240343 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for ca-certificates-mozilla fixes the following issues: * Reenable the distrusted certs for now. as these only distrust "new issued" certs starting after a certain date, while old certs should still work. (bsc#1240343) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1217=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1217=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1217=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1217=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1217=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1217=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1217=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1217=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1217=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1217=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1217=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1217=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1217=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1217=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1217=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1217=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1217=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1217=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1217=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1217=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1217=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1217=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1217=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1217=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1217=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1217=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Manager Proxy 4.3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Manager Server 4.3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Enterprise Storage 7.1 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Micro 5.1 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * openSUSE Leap 15.6 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * Basesystem Module 15-SP6 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * Development Tools Module 15-SP6 (noarch) * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * ca-certificates-mozilla-2.74-150200.41.1 * ca-certificates-mozilla-prebuilt-2.74-150200.41.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240343 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:30:34 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 14 Apr 2025 12:30:34 -0000 Subject: SUSE-RU-2025:1242-1: moderate: Recommended update for aaa_base Message-ID: <174463383470.32203.13661702199547421533@smelt2.prg2.suse.org> # Recommended update for aaa_base Announcement ID: SUSE-RU-2025:1242-1 Release Date: 2025-04-14T10:44:26Z Rating: moderate References: * bsc#1235481 * bsc#1236033 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * SP6 logrotate and rcsyslog binary (bsc#1236033) * Update detection for systemd in rc.status * Mountpoint for cgroup changed with cgroup2 * If a user switches the login shell respect the already set PATH environment (bsc#1235481) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1242=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1242=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1242=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1242=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1242=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1242=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1242=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1242=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1242=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1242=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1242=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1242=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1242=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1242=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1242=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1242=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1242=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1242=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1242=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1242=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1242=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1242=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1242=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1242=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1242=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1242=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Manager Proxy 4.3 (x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.28.2 * aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235481 * https://bugzilla.suse.com/show_bug.cgi?id=1236033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:28 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:28 -0000 Subject: SUSE-RU-2025:1304-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479240829.29284.10332284773297989817@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:1304-1 Release Date: 2025-04-16T08:01:45Z Rating: moderate References: * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains one feature and has two fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2025-1304=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * mgrctl-debuginfo-0.1.29-1.20.1 * mgrctl-0.1.29-1.20.1 * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch) * mgrctl-bash-completion-0.1.29-1.20.1 * spacecmd-5.0.12-1.49.1 * mgrctl-zsh-completion-0.1.29-1.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:37 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:37 -0000 Subject: SUSE-RU-2025:1303-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479241762.29284.5227630734078361579@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:1303-1 Release Date: 2025-04-16T08:01:29Z Rating: moderate References: * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Debian 12 An update that contains one feature and has two fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2025-1303=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (all) * mgrctl-bash-completion-0.1.29-2.21.1 * mgrctl-zsh-completion-0.1.29-2.21.1 * spacecmd-5.0.12-3.29.1 * mgrctl-fish-completion-0.1.29-2.21.1 * SUSE Manager Client Tools for Debian 12 (amd64) * mgrctl-0.1.29-2.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:42 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:42 -0000 Subject: SUSE-RU-202503:15297-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479242273.29284.2439509917970295116@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-202503:15297-1 Release Date: 2025-04-16T08:01:19Z Rating: moderate References: * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 24.04 2404 An update that contains one feature and has two fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on server volumes (bsc#1235861) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 24.04 2404 zypper in -t patch suse-ubu244ct-client-tools-202503-15297=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 24.04 2404 (all) * mgrctl-zsh-completion-0.1.29-2.11.1 * mgrctl-fish-completion-0.1.29-2.11.1 * spacecmd-5.0.12-2.9.1 * mgrctl-bash-completion-0.1.29-2.11.1 * SUSE Manager Client Tools for Ubuntu 24.04 2404 (amd64) * mgrctl-0.1.29-2.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:45 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:45 -0000 Subject: SUSE-RU-202503:15296-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479242587.29284.9378974604266018186@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-202503:15296-1 Release Date: 2025-04-16T07:59:28Z Rating: moderate References: * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains one feature and has two fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on server volumes (bsc#1235861) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202503-15296=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (all) * mgrctl-bash-completion-0.1.29-2.21.1 * mgrctl-zsh-completion-0.1.29-2.21.1 * spacecmd-5.0.12-2.53.1 * mgrctl-fish-completion-0.1.29-2.21.1 * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * mgrctl-0.1.29-2.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:54 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:54 -0000 Subject: SUSE-RU-202503:15295-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479243464.29284.405417538892199883@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-202503:15295-1 Release Date: 2025-04-16T07:59:16Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1226964 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that contains one feature and has 10 fixes can now be installed. ## Description: This update fixes the following issues: salt: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 (bsc#1226964) * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Enhancements of Salt packaging: * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Made salt-minion to require flavored zypp-plugin * Made zyppnotify to use update-alternatives * Dropped unused yumnotify plugin * Added dependency to python3-dnf-plugins-core for RHEL based spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on server volumes (bsc#1235861) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202503-15295=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (all) * mgrctl-fish-completion-0.1.29-2.19.1 * mgrctl-zsh-completion-0.1.29-2.19.1 * mgrctl-bash-completion-0.1.29-2.19.1 * salt-minion-3006.0+ds-1+2.137.1 * spacecmd-5.0.12-2.98.1 * salt-common-3006.0+ds-1+2.137.1 * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * mgrctl-0.1.29-2.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226964 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:58 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:33:58 -0000 Subject: SUSE-RU-2025:1299-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479243898.29284.1891190642810096843@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:1299-1 Release Date: 2025-04-16T07:58:56Z Rating: moderate References: * bsc#1221505 * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Package Hub 15 15-SP6 An update that contains one feature and has three fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-common-libs: * Version 5.0.6-0 * Make ISSv1 timezone independent (bsc#1221505) uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1299=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1299=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1299=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1299=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.17.0-150000.3.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.17.0-150000.3.27.1 * openSUSE Leap 15.6 (noarch) * spacecmd-5.0.12-150000.3.133.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * mgrctl-0.1.29-150000.1.21.1 * python3-uyuni-common-libs-5.0.6-150000.1.48.1 * mgrctl-debuginfo-0.1.29-150000.1.21.1 * SUSE Manager Client Tools for SLE 15 (noarch) * mgrctl-bash-completion-0.1.29-150000.1.21.1 * mgrctl-lang-0.1.29-150000.1.21.1 * spacecmd-5.0.12-150000.3.133.1 * mgrctl-zsh-completion-0.1.29-150000.1.21.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * mgrctl-0.1.29-150000.1.21.1 * mgrctl-debuginfo-0.1.29-150000.1.21.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * mgrctl-bash-completion-0.1.29-150000.1.21.1 * mgrctl-lang-0.1.29-150000.1.21.1 * mgrctl-zsh-completion-0.1.29-150000.1.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221505 * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:02 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:34:02 -0000 Subject: SUSE-RU-2025:1298-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools Message-ID: <174479244281.29284.14449821703617895633@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:1298-1 Release Date: 2025-04-16T07:57:53Z Rating: moderate References: * bsc#1221505 * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that contains one feature and has three fixes can now be installed. ## Description: This update fixes the following issues: golang-github-prometheus-promu: * Removed debug files for Red Hat Enterprise Linux spacecmd: * Version 5.0.12-0 * Allow translation to wrap strings as weblate forces it * Show Source String change for translations uyuni-common-libs: * Version 5.0.6-0 * Make ISSv1 timezone independent (bsc#1221505) uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1298=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * mgrctl-debuginfo-0.1.29-1.21.1 * mgrctl-0.1.29-1.21.1 * python2-uyuni-common-libs-5.0.6-1.48.1 * golang-github-prometheus-promu-0.17.0-1.27.1 * SUSE Manager Client Tools for SLE 12 (noarch) * spacecmd-5.0.12-38.156.1 * mgrctl-bash-completion-0.1.29-1.21.1 * mgrctl-zsh-completion-0.1.29-1.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221505 * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:33 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:34:33 -0000 Subject: SUSE-SU-2025:1297-1: moderate: Security update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Message-ID: <174479247300.29284.15687817976400981242@smelt2.prg2.suse.org> # Security update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Announcement ID: SUSE-SU-2025:1297-1 Release Date: 2025-04-16T07:57:31Z Rating: moderate References: * bsc#1221505 * bsc#1225287 * bsc#1226273 * bsc#1227118 * bsc#1227859 * bsc#1231983 * bsc#1233500 * bsc#1234033 * bsc#1234202 * bsc#1234226 * bsc#1234442 * bsc#1235527 * bsc#1235696 * bsc#1235825 * bsc#1235853 * bsc#1235970 * bsc#1236011 * bsc#1236118 * bsc#1236166 * bsc#1236234 * bsc#1236268 * bsc#1236323 * bsc#1236601 * bsc#1236625 * bsc#1236678 * bsc#1236707 * bsc#1237060 * bsc#1237403 * bsc#1237535 * bsc#1237694 * bsc#1238924 * bsc#1239826 * bsc#1240960 * jsc#MSQA-934 Cross-References: * CVE-2025-23392 CVSS scores: * CVE-2025-23392 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23392 ( SUSE ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that solves one vulnerability, contains one feature and has 32 security fixes can now be installed. ## Recommended update 5.0.4 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.12: * Image rebuilt to the newest version with updated dependencies proxy-httpd-image: * Version 5.0.10: * Fixed wrong IP address set on susemanager-tftpsync-recv.conf * Image rebuilt to the newest version with updated dependencies proxy-salt-broker-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image: * Version 5.0.10: * Set maximal cache time for metadata to 5 minutes * Image rebuilt to the newest version with updated dependencies proxy-ssh-image: * version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-tftpd-image: * Version 5.0.10: * Fixed possible collisions replacing FQDNs for proxies (bsc#1236601) * Replaced server hostname in chained proxy tftp container (bsc#1236166) * Image rebuilt to the newest version with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.12: * Image rebuilt to the newest version with updated dependencies proxy-httpd-image: * Version 5.0.10: * Fixed wrong IP address set on susemanager-tftpsync-recv.conf * Image rebuilt to the newest version with updated dependencies proxy-salt-broker-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image: * Version 5.0.10: * Set maximal cache time for metadata to 5 minutes * Image rebuilt to the newest version with updated dependencies proxy-ssh-image: * version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-tftpd-image: * Version 5.0.10: * Fixed possible collisions replacing FQDNs for proxies (bsc#1236601) * Replaced server hostname in chained proxy tftp container (bsc#1236166) * Image rebuilt to the newest version with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Server ### Description: This update fixes the following issues: server-attestation-image: * Version 5.0.8: * Image rebuilt to the newest version with updated dependencies server-hub-xmlrpc-api-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies server-image: * Version 5.0.13: * Image rebuilt to the newest version with updated dependencies server-migration-14-16-image: * Version 5.0.11: * Image rebuilt to the newest version with updated dependencies ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1297=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1297=1 * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1297=1 ## Package List: * SUSE Manager Proxy 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Proxy 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.12.13 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.12.28 * SUSE Manager Proxy 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Proxy 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.12.13 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.12.28 * SUSE Manager Retail Branch Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-aarch64-server-image-5.0.4-7.17.29 * SUSE Manager Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-ppc64le-server-image-5.0.4-7.17.29 * suse-manager-5.0-ppc64le-server-attestation-image-5.0.4-6.12.11 * SUSE Manager Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-s390x-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-s390x-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-s390x-server-image-5.0.4-7.17.29 * SUSE Manager Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-x86_64-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-x86_64-server-image-5.0.4-7.17.29 * suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.4-7.12.23 ## References: * https://www.suse.com/security/cve/CVE-2025-23392.html * https://bugzilla.suse.com/show_bug.cgi?id=1221505 * https://bugzilla.suse.com/show_bug.cgi?id=1225287 * https://bugzilla.suse.com/show_bug.cgi?id=1226273 * https://bugzilla.suse.com/show_bug.cgi?id=1227118 * https://bugzilla.suse.com/show_bug.cgi?id=1227859 * https://bugzilla.suse.com/show_bug.cgi?id=1231983 * https://bugzilla.suse.com/show_bug.cgi?id=1233500 * https://bugzilla.suse.com/show_bug.cgi?id=1234033 * https://bugzilla.suse.com/show_bug.cgi?id=1234202 * https://bugzilla.suse.com/show_bug.cgi?id=1234226 * https://bugzilla.suse.com/show_bug.cgi?id=1234442 * https://bugzilla.suse.com/show_bug.cgi?id=1235527 * https://bugzilla.suse.com/show_bug.cgi?id=1235696 * https://bugzilla.suse.com/show_bug.cgi?id=1235825 * https://bugzilla.suse.com/show_bug.cgi?id=1235853 * https://bugzilla.suse.com/show_bug.cgi?id=1235970 * https://bugzilla.suse.com/show_bug.cgi?id=1236011 * https://bugzilla.suse.com/show_bug.cgi?id=1236118 * https://bugzilla.suse.com/show_bug.cgi?id=1236166 * https://bugzilla.suse.com/show_bug.cgi?id=1236234 * https://bugzilla.suse.com/show_bug.cgi?id=1236268 * https://bugzilla.suse.com/show_bug.cgi?id=1236323 * https://bugzilla.suse.com/show_bug.cgi?id=1236601 * https://bugzilla.suse.com/show_bug.cgi?id=1236625 * https://bugzilla.suse.com/show_bug.cgi?id=1236678 * https://bugzilla.suse.com/show_bug.cgi?id=1236707 * https://bugzilla.suse.com/show_bug.cgi?id=1237060 * https://bugzilla.suse.com/show_bug.cgi?id=1237403 * https://bugzilla.suse.com/show_bug.cgi?id=1237535 * https://bugzilla.suse.com/show_bug.cgi?id=1237694 * https://bugzilla.suse.com/show_bug.cgi?id=1238924 * https://bugzilla.suse.com/show_bug.cgi?id=1239826 * https://bugzilla.suse.com/show_bug.cgi?id=1240960 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:35 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:34:35 -0000 Subject: SUSE-RU-2025:1296-1: moderate: Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Message-ID: <174479247593.29284.11945539666861676907@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2025:1296-1 Release Date: 2025-04-16T07:55:34Z Rating: moderate References: * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that contains one feature and has two fixes can now be installed. ## Recommended update 5.0.4 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) How to apply this update: 1. Log in as root user to the Multi-Linux Manager Proxy. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Recommended update 5.0.4 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) How to apply this update: 1. Log in as root user to the Multi-Linux Manager Retail Branch Server. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Recommended update 5.0.4 for Multi-Linux Manager Server ### Description: This update fixes the following issues: uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) How to apply this update: 1. Log in as root user to the Multi-Linux Manager Server. 2. Upgrade mgradm and mgrctl. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgradm upgrade podman` which will use the default image tags. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1296=1 * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1296=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1296=1 ## Package List: * SUSE Manager Server 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgradm-0.1.29-150500.3.23.1 * mgradm-debuginfo-0.1.29-150500.3.23.1 * mgrctl-debuginfo-0.1.29-150500.3.23.1 * mgrctl-0.1.29-150500.3.23.1 * SUSE Manager Server 5.0 Extension (noarch) * mgrctl-lang-0.1.29-150500.3.23.1 * mgradm-bash-completion-0.1.29-150500.3.23.1 * mgradm-zsh-completion-0.1.29-150500.3.23.1 * mgrctl-bash-completion-0.1.29-150500.3.23.1 * mgrctl-zsh-completion-0.1.29-150500.3.23.1 * mgradm-lang-0.1.29-150500.3.23.1 * SUSE Manager Proxy 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-0.1.29-150500.3.23.1 * mgrpxy-0.1.29-150500.3.23.1 * SUSE Manager Proxy 5.0 Extension (noarch) * mgrpxy-bash-completion-0.1.29-150500.3.23.1 * mgrpxy-lang-0.1.29-150500.3.23.1 * mgrpxy-zsh-completion-0.1.29-150500.3.23.1 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-0.1.29-150500.3.23.1 * mgrpxy-0.1.29-150500.3.23.1 * SUSE Manager Retail Branch Server 5.0 Extension (noarch) * mgrpxy-bash-completion-0.1.29-150500.3.23.1 * mgrpxy-lang-0.1.29-150500.3.23.1 * mgrpxy-zsh-completion-0.1.29-150500.3.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:45 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:34:45 -0000 Subject: SUSE-SU-2025:1294-1: important: Security update for rubygem-bundler Message-ID: <174479248527.29284.15071089553705348435@smelt2.prg2.suse.org> # Security update for rubygem-bundler Announcement ID: SUSE-SU-2025:1294-1 Release Date: 2025-04-16T07:53:41Z Rating: important References: * bsc#1185842 Cross-References: * CVE-2020-36327 CVSS scores: * CVE-2020-36327 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-36327 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for rubygem-bundler fixes the following issues: * CVE-2020-36327: Fixed bundler choosing a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen (bsc#1185842) Other fixes: \- Updated to version 2.2.34 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1294=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1294=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1294=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1294=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1294=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1294=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-doc-2.2.34-150000.3.11.1 * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Proxy 4.3 (x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36327.html * https://bugzilla.suse.com/show_bug.cgi?id=1185842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:46 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 08:34:46 -0000 Subject: SUSE-RU-2025:1292-1: moderate: Recommended update for timezone Message-ID: <174479248691.29284.9799379011339544387@smelt2.prg2.suse.org> # Recommended update for timezone Announcement ID: SUSE-RU-2025:1292-1 Release Date: 2025-04-16T07:50:30Z Rating: moderate References: Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for timezone fixes the following issues: * Version update 2025b * New zone for Aysen Region in Chile (America/Coyhaique) which moves from -04/-03 to -03 * Refresh patches for philippines historical data and china tzdata ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1292=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1292=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1292=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1292=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1292=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1292=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1292=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1292=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1292=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1292=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1292=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1292=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1292=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1292=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1292=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1292=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1292=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1292=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1292=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1292=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1292=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1292=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1292=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1292=1 ## Package List: * openSUSE Leap 15.6 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Manager Proxy 4.3 (x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Manager Proxy 4.3 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Manager Server 4.3 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Enterprise Storage 7.1 (noarch) * timezone-java-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * timezone-debuginfo-2025b-150000.75.34.2 * timezone-debugsource-2025b-150000.75.34.2 * timezone-2025b-150000.75.34.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:24 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:24 -0000 Subject: SUSE-SU-2025:1326-1: important: Security update for pgadmin4 Message-ID: <174480662492.29196.6160277465114849274@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2025:1326-1 Release Date: 2025-04-16T08:37:33Z Rating: important References: * bsc#1224295 * bsc#1234840 * bsc#1239308 Cross-References: * CVE-2023-1907 * CVE-2024-4068 * CVE-2025-27152 CVSS scores: * CVE-2023-1907 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-1907 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-1907 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2024-4068 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27152 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27152 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-27152 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * Python 3 Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-27152: Fixed SSRF and creadential leakage due to requests sent to absolute URL even when baseURL is set (bsc#1239308) * CVE-2023-1907: Fixed an issue which could result in users being authenticated in another user's session if two users authenticate simultaneously via ldap (bsc#1234840) * CVE-2024-4068: Fixed a possible memory exhaustion (bsc#1224295) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1326=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1326=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1326=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1326=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1326=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1326=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * openSUSE Leap 15.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-web-uwsgi-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * Python 3 Module 15-SP6 (s390x) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * Python 3 Module 15-SP6 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Proxy 4.3 (x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Proxy 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Server 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Enterprise Storage 7.1 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1907.html * https://www.suse.com/security/cve/CVE-2024-4068.html * https://www.suse.com/security/cve/CVE-2025-27152.html * https://bugzilla.suse.com/show_bug.cgi?id=1224295 * https://bugzilla.suse.com/show_bug.cgi?id=1234840 * https://bugzilla.suse.com/show_bug.cgi?id=1239308 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:39 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:39 -0000 Subject: SUSE-SU-2025:1324-1: important: Security update for apache2-mod_auth_openidc Message-ID: <174480663998.29196.9223155161690181389@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:1324-1 Release Date: 2025-04-16T08:36:12Z Rating: important References: * bsc#1240893 Cross-References: * CVE-2025-31492 CVSS scores: * CVE-2025-31492 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31492 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31492 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-31492: Fixed a bug where OIDCProviderAuthRequestMethod POSTs can leak protected data. (bsc#1240893) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1324=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1324=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1324=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1324=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31492.html * https://bugzilla.suse.com/show_bug.cgi?id=1240893 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:46 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:46 -0000 Subject: SUSE-RU-2025:1322-1: moderate: Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes Message-ID: <174480664667.29196.3324237418270638789@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes Announcement ID: SUSE-RU-2025:1322-1 Release Date: 2025-04-16T08:15:11Z Rating: moderate References: * bsc#1239826 * jsc#MSQA-936 Affected Products: * openSUSE Leap 15.4 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.15.1 * Bugs mentioned: bsc#1239826 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1322=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1322=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-4.3.15.1-150400.3.128.2 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.15.1-150400.3.128.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239826 * https://jira.suse.com/browse/MSQA-936 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:51 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:51 -0000 Subject: SUSE-SU-2025:1321-1: important: Maintenance update for Multi-Linux Manager 4.3: Server Message-ID: <174480665107.29196.3884569430168438368@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 4.3: Server Announcement ID: SUSE-SU-2025:1321-1 Release Date: 2025-04-16T08:14:57Z Rating: important References: * bsc#1239826 * jsc#MSQA-936 Cross-References: * CVE-2025-23392 CVSS scores: * CVE-2025-23392 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23392 ( SUSE ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N Affected Products: * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update fixes the following issues: spacewalk-java: * Version 4.3.85-0: * CVE-2025-23392: Filter user input in systems list page. (bsc#1239826) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1321=1 ## Package List: * SUSE Manager Server 4.3 Module (noarch) * spacewalk-java-lib-4.3.85-150400.3.105.3 * spacewalk-java-config-4.3.85-150400.3.105.3 * spacewalk-taskomatic-4.3.85-150400.3.105.3 * spacewalk-java-4.3.85-150400.3.105.3 * spacewalk-java-postgresql-4.3.85-150400.3.105.3 ## References: * https://www.suse.com/security/cve/CVE-2025-23392.html * https://bugzilla.suse.com/show_bug.cgi?id=1239826 * https://jira.suse.com/browse/MSQA-936 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:55 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:55 -0000 Subject: SUSE-RU-2025:1320-1: moderate: Recommended update for golang-github-prometheus-node_exporter, system-user-prometheus Message-ID: <174480665584.29196.8821865703804645755@smelt2.prg2.suse.org> # Recommended update for golang-github-prometheus-node_exporter, system-user- prometheus Announcement ID: SUSE-RU-2025:1320-1 Release Date: 2025-04-16T08:14:40Z Rating: moderate References: * bsc#1235516 * jsc#PED-12485 Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that contains one feature and has one fix can now be installed. ## Description: This update for golang-github-prometheus-node_exporter and system-user- prometheus fixes the following issues: golang-github-prometheus-node_exporter was updated from version 1.7.0 to version 1.9.0 (jsc#PED-12485): * Packaging improvements: * Use `systemd-sysusers` to configure the user in a dedicated 'system-user- prometheus' subpackage (bsc#1235516) * Remove `systemd` and `shadow` hard requirements * Version 1.9.0: * [CHANGE] meminfo: Convert linux implementation to use procfs lib * [CHANGE] Update logging to use Go log/slog * [FEATURE] filesystem: Add node_filesystem_mount_info metric * [FEATURE] btrfs: Add metrics for commit statistics * [FEATURE] interrupts: Add collector include/exclude filtering * [FEATURE] interrupts: Add "exclude zeros" filtering * [FEATURE] slabinfo: Add filters for slab name. * [FEATURE] pressure: add IRQ PSI metrics * [FEATURE] hwmon: Add include and exclude filter for sensors * [FEATURE] filesystem: Add NetBSD support * [FEATURE] netdev: Add ifAlias label * [FEATURE] hwmon: Add Support for GPU Clock Frequencies * [FEATURE] Add exclude[] URL parameter * [FEATURE] Add AIX support * [FEATURE] filesystem: Add fs-types/mount-points include flags * [FEATURE] netstat: Add collector for tcp packet counters for FreeBSD. * [ENHANCEMENT] ethtool: Add logging for filtering flags * [ENHANCEMENT] netstat: Add TCPRcvQDrop to default metrics * [ENHANCEMENT] diskstats: Add block device rotational * [ENHANCEMENT] cpu: Support CPU online status * [ENHANCEMENT] arp: optimize interface name resolution * [ENHANCEMENT] textfile: Allow specifiying multiple directoryglobs * [ENHANCEMENT] filesystem: Add reporting of purgeable space on MacOS * [ENHANCEMENT] ethtool: Skip full scan of NetClass directories * [BUGFIX] zfs: Prevent procfs integer underflow * [BUGFIX] pressure: Fix collection on systems that do not expose a full CPU stat * [BUGFIX] cpu: Fix FreeBSD 32-bit host support and plug memory leak * [BUGFIX] hwmon: Add safety check to hwmon read * [BUGFIX] zfs: Allow space in dataset name * Version 1.8.2: * [BUGFIX] Fix CPU pressure metric collection * Version 1.8.1: * [BUGFIX] Fix CPU seconds on Solaris * [BUGFIX] Sign Darwin/MacOS binaries * [BUGFIX] Fix pressure collector nil reference * Version 1.8.0: * [CHANGE] exec_bsd: Fix labels for vm.stats.sys.v_syscall sysctl * [CHANGE] diskstats: Ignore zram devices on linux systems * [CHANGE] textfile: Avoid inconsistent help-texts * [CHANGE] os: Removed caching of modtime/filename of os-release file * [FEATURE] xfrm: Add new collector * [FEATURE] watchdog: Add new collector * [ENHANCEMENT] cpu_vulnerabilities: Add mitigation information label * [ENHANCEMENT] nfsd: Handle new wdeleg_getattr attribute * [ENHANCEMENT] netstat: Add TCPOFOQueue to default netstat metrics * [ENHANCEMENT] filesystem: surface device errors * [ENHANCEMENT] os: Add support end parsing * [ENHANCEMENT] zfs: Log mib when sysctl read fails on FreeBSD * [ENHANCEMENT] fibre_channel: update procfs to take into account optional attributes * [BUGFIX] cpu: Fix debug log in cpu collector * [BUGFIX] hwmon: Fix hwmon nil ptr * [BUGFIX] hwmon: Fix hwmon error capture * [BUGFIX] zfs: Revert "Add ZFS freebsd per dataset stats * [BUGFIX] ethtool: Sanitize ethtool metric name keys * [BUGFIX] fix: data race of NetClassCollector metrics initialization system-user-prometheus: * Implemented `system-user-prometheus` as new requirement for `golang-github- prometheus-node_exporter` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1320=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1320=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1320=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-1.33.1 * SUSE Manager Client Tools for SLE 12 (noarch) * system-user-prometheus-1.0.0-3.8.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-1.33.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * system-user-prometheus-1.0.0-3.8.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * golang-github-prometheus-node_exporter-1.9.0-1.33.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * system-user-prometheus-1.0.0-3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235516 * https://jira.suse.com/browse/PED-12485 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:59 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:30:59 -0000 Subject: SUSE-RU-2025:1319-1: moderate: Recommended update for golang-github-prometheus-node_exporter, system-user-prometheus Message-ID: <174480665961.29196.4528270891334774280@smelt2.prg2.suse.org> # Recommended update for golang-github-prometheus-node_exporter, system-user- prometheus Announcement ID: SUSE-RU-2025:1319-1 Release Date: 2025-04-16T08:14:18Z Rating: moderate References: * bsc#1235516 * jsc#PED-12485 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 Module * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module * SUSE Package Hub 15 15-SP6 An update that contains one feature and has one fix can now be installed. ## Description: This update for golang-github-prometheus-node_exporter and system-user- prometheus fixes the following issues: golang-github-prometheus-node_exporter was updated from version 1.7.0 to version 1.9.0 (jsc#PED-12485): * Packaging improvements: * Use `systemd-sysusers` to configure the user in a dedicated 'system-user- prometheus' subpackage (bsc#1235516) * Remove `systemd` and `shadow` hard requirements * Version 1.9.0: * [CHANGE] meminfo: Convert linux implementation to use procfs lib * [CHANGE] Update logging to use Go log/slog * [FEATURE] filesystem: Add node_filesystem_mount_info metric * [FEATURE] btrfs: Add metrics for commit statistics * [FEATURE] interrupts: Add collector include/exclude filtering * [FEATURE] interrupts: Add "exclude zeros" filtering * [FEATURE] slabinfo: Add filters for slab name. * [FEATURE] pressure: add IRQ PSI metrics * [FEATURE] hwmon: Add include and exclude filter for sensors * [FEATURE] filesystem: Add NetBSD support * [FEATURE] netdev: Add ifAlias label * [FEATURE] hwmon: Add Support for GPU Clock Frequencies * [FEATURE] Add exclude[] URL parameter * [FEATURE] Add AIX support * [FEATURE] filesystem: Add fs-types/mount-points include flags * [FEATURE] netstat: Add collector for tcp packet counters for FreeBSD. * [ENHANCEMENT] ethtool: Add logging for filtering flags * [ENHANCEMENT] netstat: Add TCPRcvQDrop to default metrics * [ENHANCEMENT] diskstats: Add block device rotational * [ENHANCEMENT] cpu: Support CPU online status * [ENHANCEMENT] arp: optimize interface name resolution * [ENHANCEMENT] textfile: Allow specifiying multiple directoryglobs * [ENHANCEMENT] filesystem: Add reporting of purgeable space on MacOS * [ENHANCEMENT] ethtool: Skip full scan of NetClass directories * [BUGFIX] zfs: Prevent procfs integer underflow * [BUGFIX] pressure: Fix collection on systems that do not expose a full CPU stat * [BUGFIX] cpu: Fix FreeBSD 32-bit host support and plug memory leak * [BUGFIX] hwmon: Add safety check to hwmon read * [BUGFIX] zfs: Allow space in dataset name * Version 1.8.2: * [BUGFIX] Fix CPU pressure metric collection * Version 1.8.1: * [BUGFIX] Fix CPU seconds on Solaris * [BUGFIX] Sign Darwin/MacOS binaries * [BUGFIX] Fix pressure collector nil reference * Version 1.8.0: * [CHANGE] exec_bsd: Fix labels for vm.stats.sys.v_syscall sysctl * [CHANGE] diskstats: Ignore zram devices on linux systems * [CHANGE] textfile: Avoid inconsistent help-texts * [CHANGE] os: Removed caching of modtime/filename of os-release file * [FEATURE] xfrm: Add new collector * [FEATURE] watchdog: Add new collector * [ENHANCEMENT] cpu_vulnerabilities: Add mitigation information label * [ENHANCEMENT] nfsd: Handle new wdeleg_getattr attribute * [ENHANCEMENT] netstat: Add TCPOFOQueue to default netstat metrics * [ENHANCEMENT] filesystem: surface device errors * [ENHANCEMENT] os: Add support end parsing * [ENHANCEMENT] zfs: Log mib when sysctl read fails on FreeBSD * [ENHANCEMENT] fibre_channel: update procfs to take into account optional attributes * [BUGFIX] cpu: Fix debug log in cpu collector * [BUGFIX] hwmon: Fix hwmon nil ptr * [BUGFIX] hwmon: Fix hwmon error capture * [BUGFIX] zfs: Revert "Add ZFS freebsd per dataset stats * [BUGFIX] ethtool: Sanitize ethtool metric name keys * [BUGFIX] fix: data race of NetClassCollector metrics initialization system-user-prometheus: * Implemented `system-user-prometheus` as new requirement for `golang-github- prometheus-node_exporter` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1319=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1319=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1319=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1319=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1319=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1319=1 * SUSE Manager Retail Branch Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Retail-Branch- Server-4.3-2025-1319=1 * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1319=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1319=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1319=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1319=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1319=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1319=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1319=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1319=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1319=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1319=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1319=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1319=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1319=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1319=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1319=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1319=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * openSUSE Leap 15.6 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Client Tools for SLE 15 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * Basesystem Module 15-SP6 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Package Hub 15 15-SP6 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Proxy 4.3 Module (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Retail Branch Server 4.3 Module (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Server 4.3 Module (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * system-user-prometheus-1.0.0-150000.14.2 * SUSE Manager Proxy 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.0-150100.3.32.3 * SUSE Enterprise Storage 7.1 (noarch) * system-user-prometheus-1.0.0-150000.14.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235516 * https://jira.suse.com/browse/PED-12485 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:14 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:14 -0000 Subject: SUSE-RU-2025:1317-1: moderate: Recommended update for salt Message-ID: <174480667420.29196.6252735023927801630@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:1317-1 Release Date: 2025-04-16T08:09:42Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has seven fixes can now be installed. ## Description: This update for salt fixes the following issues: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Enhancements of Salt packaging: * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Made salt-minion to require flavored zypp-plugin * Made zyppnotify to use update-alternatives * Dropped unused yumnotify plugin * Added dependency to python3-dnf-plugins-core for RHEL based ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1317=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1317=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1317=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1317=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1317=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1317=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1317=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1317=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1317=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1317=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1317=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1317=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * salt-master-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * python311-salt-testsuite-3006.0-150400.8.75.1 * python3-salt-testsuite-3006.0-150400.8.75.1 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * python311-salt-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * openSUSE Leap 15.4 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * salt-master-3006.0-150400.8.75.3 * salt-transactional-update-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Manager Proxy 4.3 (x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Manager Proxy 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * salt-master-3006.0-150400.8.75.3 * salt-proxy-3006.0-150400.8.75.3 * salt-3006.0-150400.8.75.3 * salt-doc-3006.0-150400.8.75.3 * salt-ssh-3006.0-150400.8.75.3 * python3-salt-3006.0-150400.8.75.3 * salt-syndic-3006.0-150400.8.75.3 * salt-minion-3006.0-150400.8.75.3 * salt-api-3006.0-150400.8.75.3 * salt-cloud-3006.0-150400.8.75.3 * salt-standalone-formulas-configuration-3006.0-150400.8.75.3 * SUSE Manager Server 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.75.3 * salt-fish-completion-3006.0-150400.8.75.3 * salt-zsh-completion-3006.0-150400.8.75.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:29 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:29 -0000 Subject: SUSE-RU-2025:1315-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480668968.29196.16676748738168689885@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-2025:1315-1 Release Date: 2025-04-16T08:08:18Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2025-1315=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-1.53.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:35 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:35 -0000 Subject: SUSE-RU-2025:1312-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480669577.29196.3386762970182344417@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-2025:1312-1 Release Date: 2025-04-16T08:06:22Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Debian 12 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2025-1312=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (amd64) * venv-salt-minion-3006.0-2.29.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:42 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:42 -0000 Subject: SUSE-RU-202503:15301-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480670279.29196.9915453212192205745@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-202503:15301-1 Release Date: 2025-04-16T08:05:39Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202503-15301=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * venv-salt-minion-3006.0-2.69.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:48 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:48 -0000 Subject: SUSE-RU-202503:15300-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480670885.29196.6721786276631596012@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-202503:15300-1 Release Date: 2025-04-16T08:05:12Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202503-15300=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * venv-salt-minion-3006.0-2.60.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:31:56 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:31:56 -0000 Subject: SUSE-RU-202503:15299-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480671610.29196.3812082390972623994@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-202503:15299-1 Release Date: 2025-04-16T08:04:45Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Manager Client Tools for Ubuntu 24.04 2404 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 24.04 2404 zypper in -t patch suse-ubu244ct-client-tools-202503-15299=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 24.04 2404 (amd64) * venv-salt-minion-3006.0-2.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:32:02 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:32:02 -0000 Subject: SUSE-RU-2025:1308-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480672265.29196.13438418547196207326@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-2025:1308-1 Release Date: 2025-04-16T08:04:15Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1308=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1308=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1308=1 * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1308=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.75.5 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * venv-salt-minion-3006.0-150000.3.75.5 * SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.75.5 * SUSE Manager Server 4.3 Module (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.75.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:32:09 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 16 Apr 2025 12:32:09 -0000 Subject: SUSE-RU-2025:1307-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Message-ID: <174480672986.29196.16876097644674148@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Salt Bundle Announcement ID: SUSE-RU-2025:1307-1 Release Date: 2025-04-16T08:02:50Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * jsc#MSQA-934 Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that contains one feature and has seven fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhanced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issue of using update-alternatives with alts * Fixed issues running on Python 3.12 and 3.13 * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and added support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Made _auth calls visible with master stats * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Made x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1307=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-3.73.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 08:30:14 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 17 Apr 2025 08:30:14 -0000 Subject: SUSE-SU-2025:1333-1: important: Security update for cosign Message-ID: <174487861476.29284.13682019622777712334@smelt2.prg2.suse.org> # Security update for cosign Announcement ID: SUSE-SU-2025:1333-1 Release Date: 2025-04-17T01:38:48Z Rating: important References: * bsc#1227031 * bsc#1232985 * bsc#1237682 * bsc#1238693 * bsc#1239204 * bsc#1239337 * jsc#SLE-23476 Cross-References: * CVE-2024-51744 * CVE-2024-6104 * CVE-2025-22868 * CVE-2025-22869 * CVE-2025-22870 * CVE-2025-27144 CVSS scores: * CVE-2024-51744 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities and contains one feature can now be installed. ## Description: This update for cosign fixes the following issues: * CVE-2024-6104: cosign: hashicorp/go-retryablehttp: Fixed sensitive information disclosure to log file (bsc#1227031) * CVE-2024-51744: cosign: github.com/golang-jwt/jwt/v4: Fixed bad documentation of error handling in ParseWithClaims leading to potentially dangerous situations (bsc#1232985) * CVE-2025-27144: cosign: github.com/go-jose/go-jose/v4,github.com/go-jose/go- jose/v3: Fixed denial of service in Go JOSE's Parsing (bsc#1237682) * CVE-2025-22870: cosign: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238693) * CVE-2025-22868: cosign: golang.org/x/oauth2/jws: Fixed unexpected memory consumption during token parsing (bsc#1239204) * CVE-2025-22869: cosign: golang.org/x/crypto/ssh: Fixed denial of service in the Key Exchange (bsc#1239337) Other fixes: * Update to version 2.5.0 (jsc#SLE-23476): * Update sigstore-go to pick up bug fixes (#4150) * Update golangci-lint to v2, update golangci-lint-action (#4143) * Feat/non filename completions (#4115) * update builder to use go1.24.1 (#4116) * Add support for new bundle specification for attesting/verifying OCI image attestations (#3889) * Remove cert log line (#4113) * cmd/cosign/cli: fix typo in ignoreTLogMessage (#4111) * bump to latest scaffolding release for testing (#4099) * increase 2e2_test docker compose tiemout to 180s (#4091) * Fix replace with compliant image mediatype (#4077) * Add TSA certificate related flags and fields for cosign attest (#4079) * Update to version 2.4.3 (jsc#SLE-23476): * Enable fetching signatures without remote get. (#4047) * Bump sigstore/sigstore to support KMS plugins (#4073) * sort properly Go imports (#4071) * sync comment with parameter name in function signature (#4063) * fix go imports order to be alphabetical (#4062) * fix comment typo and imports order (#4061) * Feat/file flag completion improvements (#4028) * Udpate builder to use go1.23.6 (#4052) * Refactor verifyNewBundle into library function (#4013) * fix parsing error in --only for cosign copy (#4049) * Fix codeowners syntax, add dep-maintainers (#4046) * Update to version 2.4.2 (jsc#SLE-23476): * Updated open-policy-agent to 1.1.0 library (#4036) * Note that only Rego v0 policies are supported at this time * Add UseSignedTimestamps to CheckOpts, refactor TSA options (#4006) * Add support for verifying root checksum in cosign initialize (#3953) * Detect if user supplied a valid protobuf bundle (#3931) * Add a log message if user doesn't provide --trusted-root (#3933) * Support mTLS towards container registry (#3922) * Add bundle create helper command (#3901) * Add trusted-root create helper command (#3876) Bug Fixes: * fix: set tls config while retaining other fields from default http transport (#4007) * policy fuzzer: ignore known panics (#3993) * Fix for multiple WithRemote options (#3982) * Add nightly conformance test workflow (#3979) * Fix copy --only for signatures + update/align docs (#3904) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1333=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1333=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1333=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1333=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1333=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1333=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1333=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1333=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1333=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1333=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1333=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1333=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1333=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1333=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Proxy 4.3 (x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * openSUSE Leap 15.4 (noarch) * cosign-bash-completion-2.5.0-150400.3.27.1 * cosign-fish-completion-2.5.0-150400.3.27.1 * cosign-zsh-completion-2.5.0-150400.3.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 ## References: * https://www.suse.com/security/cve/CVE-2024-51744.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227031 * https://bugzilla.suse.com/show_bug.cgi?id=1232985 * https://bugzilla.suse.com/show_bug.cgi?id=1237682 * https://bugzilla.suse.com/show_bug.cgi?id=1238693 * https://bugzilla.suse.com/show_bug.cgi?id=1239204 * https://bugzilla.suse.com/show_bug.cgi?id=1239337 * https://jira.suse.com/browse/SLE-23476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 08:30:22 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 17 Apr 2025 08:30:22 -0000 Subject: SUSE-SU-2025:1332-1: important: Security update for rekor Message-ID: <174487862204.29284.16489154274025612001@smelt2.prg2.suse.org> # Security update for rekor Announcement ID: SUSE-SU-2025:1332-1 Release Date: 2025-04-17T01:37:48Z Rating: important References: * bsc#1227053 * bsc#1236519 * bsc#1237638 * bsc#1239191 * bsc#1239327 * bsc#1240468 * jsc#SLE-23476 Cross-References: * CVE-2023-45288 * CVE-2024-6104 * CVE-2025-22868 * CVE-2025-22869 * CVE-2025-27144 * CVE-2025-30204 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities and contains one feature can now be installed. ## Description: This update for rekor fixes the following issues: * CVE-2023-45288: rekor: golang.org/x/net/http2: Fixed close connections when receiving too many headers (bsc#1236519) * CVE-2024-6104: rekor: hashicorp/go-retryablehttp: Fixed sensitive information disclosure inside log file (bsc#1227053) * CVE-2025-22868: rekor: golang.org/x/oauth2/jws: Fixed unexpected memory consumption during token parsing (bsc#1239191) * CVE-2025-22869: rekor: golang.org/x/crypto/ssh: Fixed denial of service in the Key Exchange (bsc#1239327) * CVE-2025-27144: rekor: gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go- jose/v4,github.com/go-jose/go-jose/v3: Fixed denial of service in Go JOSE's parsing (bsc#1237638) * CVE-2025-30204: rekor: github.com/golang-jwt/jwt/v5: Fixed jwt-go allowing excessive memory allocation during header parsing (bsc#1240468) Other fixes: * Update to version 1.3.10: * Features * Added --client-signing-algorithms flag (#1974) * Fixes / Misc * emit unpopulated values when marshalling (#2438) * pkg/api: better logs when algorithm registry rejects a key (#2429) * chore: improve mysql readiness checks (#2397) * Added --client-signing-algorithms flag (#1974) * Update to version 1.3.9 (jsc#SLE-23476): * Cache checkpoint for inactive shards (#2332) * Support per-shard signing keys (#2330) * Update to version 1.3.8: * Bug Fixes * fix zizmor issues (#2298) * remove unneeded value in log message (#2282) * Quality Enhancements * chore: relax go directive to permit 1.22.x * fetch minisign from homebrew instead of custom ppa (#2329) * fix(ci): simplify GOVERSION extraction * chore(deps): bump actions pins to latest * Updates go and golangci-lint (#2302) * update builder to use go1.23.4 (#2301) * clean up spaces * log request body on 500 error to aid debugging (#2283) * Update to version 1.3.7: * New Features * log request body on 500 error to aid debugging (#2283) * Add support for signing with Tink keyset (#2228) * Add public key hash check in Signed Note verification (#2214) * update Trillian TLS configuration (#2202) * Add TLS support for Trillian server (#2164) * Replace docker-compose with plugin if available (#2153) * Add flags to backfill script (#2146) * Unset DisableKeepalive for backfill HTTP client (#2137) * Add script to delete indexes from Redis (#2120) * Run CREATE statement in backfill script (#2109) * Add MySQL support to backfill script (#2081) * Run e2e tests on mysql and redis index backends (#2079) * Bug Fixes * remove unneeded value in log message (#2282) * Add error message when computing consistency proof (#2278) * fix validation error handling on API (#2217) * fix error in pretty-printed inclusion proof from verify subcommand (#2210) * Fix index scripts (#2203) * fix failing sharding test * Better error handling in backfill script (#2148) * Batch entries in cleanup script (#2158) * Add missing workflow for index cleanup test (#2121) * hashedrekord: fix schema $id (#2092) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1332=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1332=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1332=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1332=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1332=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1332=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1332=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1332=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1332=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1332=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1332=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Proxy 4.3 (x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://www.suse.com/security/cve/CVE-2025-30204.html * https://bugzilla.suse.com/show_bug.cgi?id=1227053 * https://bugzilla.suse.com/show_bug.cgi?id=1236519 * https://bugzilla.suse.com/show_bug.cgi?id=1237638 * https://bugzilla.suse.com/show_bug.cgi?id=1239191 * https://bugzilla.suse.com/show_bug.cgi?id=1239327 * https://bugzilla.suse.com/show_bug.cgi?id=1240468 * https://jira.suse.com/browse/SLE-23476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:21 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 17 Apr 2025 12:30:21 -0000 Subject: SUSE-SU-2025:1336-1: important: Security update for webkit2gtk3 Message-ID: <174489302166.29284.18178559907489868980@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1336-1 Release Date: 2025-04-17T11:01:57Z Rating: important References: * bsc#1240958 * bsc#1240961 * bsc#1240962 * bsc#1240963 * bsc#1240964 * bsc#1240986 * bsc#1240987 Cross-References: * CVE-2024-54551 * CVE-2025-24208 * CVE-2025-24209 * CVE-2025-24213 * CVE-2025-24216 * CVE-2025-24264 * CVE-2025-30427 CVSS scores: * CVE-2024-54551 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-24208 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-24209 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-24213 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24216 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24264 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30427 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves seven vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.48.1 * CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) * CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) * CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) * CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) * CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) * CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) * CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1336=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1336=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1336=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1336=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1336=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1336=1 ## Package List: * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit-jsc-4-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-minibrowser-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk4-devel-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit-jsc-4.1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-minibrowser-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit-6_0-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-6_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk4-minibrowser-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * webkit-jsc-6.0-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-6.0-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * webkit2gtk4-minibrowser-2.48.1-150400.4.115.2 * webkit2gtk3-minibrowser-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-4.1-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-minibrowser-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-32bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-32bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-32bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-32bit-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libjavascriptcoregtk-4_1-0-64bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-64bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-64bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-64bit-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Proxy 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 ## References: * https://www.suse.com/security/cve/CVE-2024-54551.html * https://www.suse.com/security/cve/CVE-2025-24208.html * https://www.suse.com/security/cve/CVE-2025-24209.html * https://www.suse.com/security/cve/CVE-2025-24213.html * https://www.suse.com/security/cve/CVE-2025-24216.html * https://www.suse.com/security/cve/CVE-2025-24264.html * https://www.suse.com/security/cve/CVE-2025-30427.html * https://bugzilla.suse.com/show_bug.cgi?id=1240958 * https://bugzilla.suse.com/show_bug.cgi?id=1240961 * https://bugzilla.suse.com/show_bug.cgi?id=1240962 * https://bugzilla.suse.com/show_bug.cgi?id=1240963 * https://bugzilla.suse.com/show_bug.cgi?id=1240964 * https://bugzilla.suse.com/show_bug.cgi?id=1240986 * https://bugzilla.suse.com/show_bug.cgi?id=1240987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 22 08:30:08 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 22 Apr 2025 08:30:08 -0000 Subject: SUSE-RU-2025:1354-1: moderate: Recommended update for iproute2 Message-ID: <174531060891.29284.521726962737083794@smelt2.prg2.suse.org> # Recommended update for iproute2 Announcement ID: SUSE-RU-2025:1354-1 Release Date: 2025-04-22T03:15:27Z Rating: moderate References: * bsc#1234383 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for iproute2 fixes the following issues: * Avoid false cgroup warnings (bsc#1234383) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1354=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1354=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1354=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1354=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1354=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1354=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1354=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1354=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1354=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1354=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1354=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1354=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1354=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1354=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1354=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1354=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1354=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * iproute2-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * iproute2-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * iproute2-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * iproute2-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * iproute2-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * iproute2-arpd-debuginfo-5.14-150400.3.3.1 * iproute2-debugsource-5.14-150400.3.3.1 * iproute2-debuginfo-5.14-150400.3.3.1 * iproute2-arpd-5.14-150400.3.3.1 * iproute2-bash-completion-5.14-150400.3.3.1 * iproute2-5.14-150400.3.3.1 * libnetlink-devel-5.14-150400.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234383 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 22 12:30:05 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 22 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1357-1: critical: Security update for erlang Message-ID: <174532500549.5631.12399684525995683263@smelt2.prg2.suse.org> # Security update for erlang Announcement ID: SUSE-SU-2025:1357-1 Release Date: 2025-04-22T09:30:46Z Rating: critical References: * bsc#1241300 Cross-References: * CVE-2025-32433 CVSS scores: * CVE-2025-32433 ( SUSE ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-32433 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32433 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for erlang fixes the following issues: * CVE-2025-32433: Fixed unauthenticated remote code execution in Erlang/OTP SSH (bsc#1241300) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1357=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1357=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1357=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1357=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1357=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1357=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1357=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang-diameter-23.3.4.19-150300.3.20.1 * erlang-observer-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-wx-23.3.4.19-150300.3.20.1 * erlang-dialyzer-src-23.3.4.19-150300.3.20.1 * erlang-doc-23.3.4.19-150300.3.20.1 * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-23.3.4.19-150300.3.20.1 * erlang-wx-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * erlang-reltool-23.3.4.19-150300.3.20.1 * erlang-wx-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-src-23.3.4.19-150300.3.20.1 * erlang-observer-src-23.3.4.19-150300.3.20.1 * erlang-reltool-src-23.3.4.19-150300.3.20.1 * erlang-diameter-src-23.3.4.19-150300.3.20.1 * erlang-et-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-23.3.4.19-150300.3.20.1 * erlang-et-23.3.4.19-150300.3.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang-diameter-23.3.4.19-150300.3.20.1 * erlang-observer-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-wx-23.3.4.19-150300.3.20.1 * erlang-dialyzer-src-23.3.4.19-150300.3.20.1 * erlang-doc-23.3.4.19-150300.3.20.1 * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-23.3.4.19-150300.3.20.1 * erlang-wx-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * erlang-reltool-23.3.4.19-150300.3.20.1 * erlang-wx-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-src-23.3.4.19-150300.3.20.1 * erlang-observer-src-23.3.4.19-150300.3.20.1 * erlang-reltool-src-23.3.4.19-150300.3.20.1 * erlang-diameter-src-23.3.4.19-150300.3.20.1 * erlang-et-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-23.3.4.19-150300.3.20.1 * erlang-et-23.3.4.19-150300.3.20.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Proxy 4.3 (x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32433.html * https://bugzilla.suse.com/show_bug.cgi?id=1241300 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 24 20:30:08 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 24 Apr 2025 20:30:08 -0000 Subject: SUSE-SU-2025:1369-1: important: Security update for ruby2.5 Message-ID: <174552660818.26189.15466359338398898225@smelt2.prg2.suse.org> # Security update for ruby2.5 Announcement ID: SUSE-SU-2025:1369-1 Release Date: 2025-04-24T17:12:13Z Rating: important References: * bsc#1230930 * bsc#1235773 * bsc#1237804 * bsc#1237806 Cross-References: * CVE-2024-47220 * CVE-2025-27219 * CVE-2025-27220 CVSS scores: * CVE-2024-47220 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47220 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2024-47220 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-27219 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27219 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27219 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-27219 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27220 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27220 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27220 ( NVD ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-27220 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for ruby2.5 fixes the following issues: * CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804) * CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806) Other fixes: \- Improved fix for CVE-2024-47220 (bsc#1230930, bsc#1235773) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1369=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1369=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1369=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1369=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1369=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1369=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1369=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1369=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1369=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Proxy 4.3 (x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-doc-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * openSUSE Leap 15.6 (noarch) * ruby2.5-doc-ri-2.5.9-150000.4.41.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47220.html * https://www.suse.com/security/cve/CVE-2025-27219.html * https://www.suse.com/security/cve/CVE-2025-27220.html * https://bugzilla.suse.com/show_bug.cgi?id=1230930 * https://bugzilla.suse.com/show_bug.cgi?id=1235773 * https://bugzilla.suse.com/show_bug.cgi?id=1237804 * https://bugzilla.suse.com/show_bug.cgi?id=1237806 -------------- next part -------------- An HTML attachment was scrubbed... URL: