From null at suse.de Wed May 7 12:09:57 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 May 2025 12:09:57 -0000 Subject: SUSE-SU-2025:1490-1: important: Security update for java-17-openjdk Message-ID: <174661979753.24379.13146888489342289749@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2025:1490-1 Release Date: 2025-05-06T11:49:02Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Update to upstream tag jdk-17.0.15+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-6355567: AdobeMarkerSegment causes failure to read valid JPEG + JDK-8065099: [macos] javax/swing/PopupFactory/6276087/ /NonOpaquePopupMenuTest.java fails: no background shine through + JDK-8179502: Enhance OCSP, CRL and Certificate Fetch Timeouts + JDK-8198237: [macos] Test java/awt/Frame/ /ExceptionOnSetExtendedStateTest/ /ExceptionOnSetExtendedStateTest.java fails + JDK-8198666: Many java/awt/Modal/OnTop/ test fails on mac + JDK-8208565: [TEST_BUG] javax/swing/PopupFactory/6276087/ /NonOpaquePopupMenuTest.java throws NPE + JDK-8226933: [TEST_BUG]GTK L&F: There is no swatches or RGB tab in JColorChooser + JDK-8226938: [TEST_BUG]GTK L&F: There is no Details button in FileChooser Dialog + JDK-8266435: WBMPImageReader.read() should not truncate the input stream + JDK-8267893: Improve jtreg test failure handler do get native/mixed stack traces for cores and live processes + JDK-8270961: [TESTBUG] Move GotWrongOOMEException into vm.share.gc package + JDK-8274893: Update java.desktop classes to use try-with-resources + JDK-8276202: LogFileOutput.invalid_file_vm asserts when being executed from a read only working directory + JDK-8277240: java/awt/Graphics2D/ScaledTransform/ /ScaledTransform.java dialog does not get disposed + JDK-8281234: The -protected option is not always checked in keytool and jarsigner + JDK-8282314: nsk/jvmti/SuspendThread/suspendthrd003 may leak memory + JDK-8283387: [macos] a11y : Screen magnifier does not show selected Tab + JDK-8283404: [macos] a11y : Screen magnifier does not show JMenu name + JDK-8283664: Remove jtreg tag manual=yesno for java/awt/print/PrinterJob/PrintTextTest.java + JDK-8286779: javax.crypto.CryptoPolicyParser#isConsistent always returns 'true' + JDK-8286875: ProgrammableUpcallHandler::on_entry/on_exit access thread fields from native + JDK-8290400: Must run exe installers in jpackage jtreg tests without UI + JDK-8292588: [macos] Multiscreen/MultiScreenLocationTest/ /MultiScreenLocationTest.java: Robot.mouseMove test failed on Screen #0 + JDK-8292704: sun/security/tools/jarsigner/compatibility/ /Compatibility.java use wrong key size for EC + JDK-8292848: AWT_Mixing and TrayIcon tests fail on el8 with hard-coded isOel7 + JDK-8293345: SunPKCS11 provider checks on PKCS11 Mechanism are problematic + JDK-8293412: Remove unnecessary java.security.egd overrides + JDK-8294067: [macOS] javax/swing/JComboBox/6559152/ /bug6559152.java Cannot select an item from popup with the ENTER key. + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8295087: Manual Test to Automated Test Conversion + JDK-8295176: some langtools test pollutes source tree + JDK-8296591: Signature benchmark + JDK-8296818: Enhance JMH tests java/security/Signatures.java + JDK-8299077: [REDO] JDK-4512626 Non-editable JTextArea provides no visual indication of keyboard focus + JDK-8299127: [REDO] JDK-8194048 Regression automated test '/open/test/jdk/javax/swing/text/DefaultCaret/HidingSelection/ /HidingSelectionTest.java' fails + JDK-8299128: [REDO] JDK-8213562 Test javax/swing/text/ /DefaultCaret/HidingSelection/MultiSelectionTest.java fails + JDK-8299739: HashedPasswordFileTest.java and ExceptionTest.java can fail with java.lang.NullPointerException + JDK-8299994: java/security/Policy/Root/Root.java fails when home directory is read-only + JDK-8301989: new javax.swing.text.DefaultCaret().setBlinkRate(N) results in NPE + JDK-8302111: Serialization considerations + JDK-8305853: java/text/Format/DateFormat/ /DateFormatRegression.java fails with "Uncaught exception thrown in test method Test4089106" + JDK-8306711: Improve diagnosis of `IntlTest` framework + JDK-8308341: JNI_GetCreatedJavaVMs returns a partially initialized JVM + JDK-8309171: Test vmTestbase/nsk/jvmti/scenarios/ /jni_interception/JI05/ji05t001/TestDescription.java fails after JDK-8308341 + JDK-8309231: ProblemList vmTestbase/nsk/jvmti/scenarios/ /jni_interception/JI05/ji05t001/TestDescription.java + JDK-8309740: Expand timeout windows for tests in JDK-8179502 + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8310234: Refactor Locale tests to use JUnit + JDK-8310629: java/security/cert/CertPathValidator/OCSP/ /OCSPTimeout.java fails with RuntimeException: Server not ready + JDK-8311306: Test com/sun/management/ThreadMXBean/ /ThreadCpuTimeArray.java failed: out of expected range + JDK-8311546: Certificate name constraints improperly validated with leading period + JDK-8311663: Additional refactoring of Locale tests to JUnit + JDK-8312416: Tests in Locale should have more descriptive names + JDK-8312518: [macos13] setFullScreenWindow() shows black screen on macOS 13 & above + JDK-8313633: [macOS] java/awt/dnd/NextDropActionTest/ /NextDropActionTest.java fails with java.lang.RuntimeException: wrong next drop action! + JDK-8313710: jcmd: typo in the documentation of JFR.start and JFR.dump + JDK-8314225: SIGSEGV in JavaThread::is_lock_owned + JDK-8314610: hotspot can't compile with the latest of gtest because of <iomanip> + JDK-8314752: Use google test string comparison macros + JDK-8314909: tools/jpackage/windows/Win8282351Test.java fails with java.lang.AssertionError: Expected [0]. Actual [1618]: + JDK-8314975: JavadocTester should set source path if not specified + JDK-8315486: vmTestbase/nsk/jdwp/ThreadReference/ /ForceEarlyReturn/forceEarlyReturn002/forceEarlyReturn002.java timed out + JDK-8315825: Open some swing tests + JDK-8315882: Open some swing tests 2 + JDK-8315883: Open source several Swing JToolbar tests + JDK-8315952: Open source several Swing JToolbar JTooltip JTree tests + JDK-8316056: Open source several Swing JTree tests + JDK-8316146: Open some swing tests 4 + JDK-8316149: Open source several Swing JTree JViewport KeyboardManager tests + JDK-8316218: Open some swing tests 5 + JDK-8316371: Open some swing tests 6 + JDK-8316559: Refactor some util/Calendar tests to JUnit + JDK-8316627: JViewport Test headless failure + JDK-8316696: Remove the testing base classes: IntlTest and CollatorTest + JDK-8317631: Refactor ChoiceFormat tests to use JUnit + JDK-8317636: Improve heap walking API tests to verify correctness of field indexes + JDK-8318442: java/net/httpclient/ManyRequests2.java fails intermittently on Linux + JDK-8319567: Update java/lang/invoke tests to support vm flags + JDK-8319568: Update java/lang/reflect/exeCallerAccessTest/ /CallerAccessTest.java to accept vm flags + JDK-8319569: Several java/util tests should be updated to accept VM flags + JDK-8319647: Few java/lang/System/LoggerFinder/modules tests ignore vm flags + JDK-8319648: java/lang/SecurityManager tests ignore vm flags + JDK-8319672: Several classloader tests ignore VM flags + JDK-8319673: Few security tests ignore VM flags + JDK-8319676: A couple of jdk/modules/incubator/ tests ignore VM flags + JDK-8319677: Test jdk/internal/misc/VM/RuntimeArguments.java should be marked as flagless + JDK-8319818: Address GCC 13.2.0 warnings (stringop-overflow and dangling-pointer) + JDK-8320372: test/jdk/sun/security/x509/DNSName/ /LeadingPeriod.java validity check failed + JDK-8320676: Manual printer tests have no Pass/Fail buttons, instructions close set 1 + JDK-8320691: Timeout handler on Windows takes 2 hours to complete + JDK-8320714: java/util/Locale/LocaleProvidersRun.java and java/util/ResourceBundle/modules/visibility/ /VisibilityTest.java timeout after passing + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8321818: vmTestbase/nsk/stress/strace/strace015.java failed with 'Cannot read the array length because "<local4>" is null' + JDK-8323196: jdk/jfr/api/consumer/filestream/TestOrdered.java failed with "Events are not ordered! Reuse = false" + JDK-8324672: Update jdk/java/time/tck/java/time/TCKInstant.java now() to be more robust + JDK-8324807: Manual printer tests have no Pass/Fail buttons, instructions close set 2 + JDK-8325024: java/security/cert/CertPathValidator/OCSP( /OCSPTimeout.java incorrect comment information + JDK-8325042: Remove unused JVMDITools test files + JDK-8325529: Remove unused imports from `ModuleGenerator` test file + JDK-8325659: Normalize Random usage by incubator vector tests + JDK-8325906: Problemlist vmTestbase/vm/mlvm/meth/stress/ /compiler/deoptimize/Test.java#id1 until JDK-8320865 is fixed + JDK-8325908: Finish removal of IntlTest and CollatorTest + JDK-8325937: runtime/handshake/HandshakeDirectTest.java causes "monitor end should be strictly below the frame pointer" assertion failure on AArch64 + JDK-8326421: Add jtreg test for large arrayCopy disjoint case. + JDK-8326525: com/sun/tools/attach/BasicTests.java does not verify AgentLoadException case + JDK-8327098: GTest needs larger combination limit + JDK-8327476: Upgrade JLine to 3.26.1 + JDK-8327505: Test com/sun/jmx/remote/ /NotificationMarshalVersions/TestSerializationMismatch.java fails + JDK-8327857: Remove applet usage from JColorChooser tests Test4222508 + JDK-8327859: Remove applet usage from JColorChooser tests Test4319113 + JDK-8327986: ASAN reports use-after-free in DirectivesParserTest.empty_object_vm + JDK-8328005: Convert java/awt/im/JTextFieldTest.java applet test to main + JDK-8328085: C2: Use after free in PhaseChaitin::Register_Allocate() + JDK-8328121: Remove applet usage from JColorChooser tests Test4759306 + JDK-8328130: Remove applet usage from JColorChooser tests Test4759934 + JDK-8328185: Convert java/awt/image/MemoryLeakTest/ /MemoryLeakTest.java applet test to main + JDK-8328227: Remove applet usage from JColorChooser tests Test4887836 + JDK-8328368: Convert java/awt/image/multiresolution/ /MultiDisplayTest/MultiDisplayTest.java applet test to main + JDK-8328370: Convert java/awt/print/Dialog/PrintApplet.java applet test to main + JDK-8328380: Remove applet usage from JColorChooser tests Test6348456 + JDK-8328387: Convert java/awt/Frame/FrameStateTest/ /FrameStateTest.html applet test to main + JDK-8328403: Remove applet usage from JColorChooser tests Test6977726 + JDK-8328553: Get rid of JApplet in test/jdk/sanity/client/lib/SwingSet2/src/DemoModule.java + JDK-8328558: Convert javax/swing/JCheckBox/8032667/ /bug8032667.java applet test to main + JDK-8328717: Convert javax/swing/JColorChooser/8065098/ /bug8065098.java applet test to main + JDK-8328719: Convert java/awt/print/PageFormat/SetOrient.html applet test to main + JDK-8328730: Convert java/awt/print/bug8023392/bug8023392.html applet test to main + JDK-8328753: Open source few Undecorated Frame tests + JDK-8328819: Remove applet usage from JFileChooser tests bug6698013 + JDK-8328827: Convert java/awt/print/PrinterJob/ /PrinterDialogsModalityTest/PrinterDialogsModalityTest.html applet test to main + JDK-8329210: Delete Redundant Printer Dialog Modality Test + JDK-8329320: Simplify awt/print/PageFormat/NullPaper.java test + JDK-8329322: Convert PageFormat/Orient.java to use PassFailJFrame + JDK-8329692: Add more details to FrameStateTest.java test instructions + JDK-8330702: Update failure handler to don't generate Error message if cores actions are empty + JDK-8331153: JFR: Improve logging of jdk/jfr/api/consumer/filestream/TestOrdered.java + JDK-8331735: UpcallLinker::on_exit races with GC when copying frame anchor + JDK-8331959: Update PKCS#11 Cryptographic Token Interface to v3.1 + JDK-8332158: [XWayland] test/jdk/java/awt/Mouse/ /EnterExitEvents/ResizingFrameTest.java + JDK-8332917: failure_handler should execute gdb "info threads" command on linux + JDK-8333360: PrintNullString.java doesn't use float arguments + JDK-8333391: Test com/sun/jdi/InterruptHangTest.java failed: Thread was never interrupted during sleep + JDK-8333403: Write a test to check various components events are triggered properly + JDK-8333427: langtools/tools/javac/newlines/NewLineTest.java is failing on Japanese Windows + JDK-8334305: Remove all code for nsk.share.Log verbose mode + JDK-8334490: Normalize string with locale invariant `toLowerCase()` + JDK-8334777: Test javax/management/remote/mandatory/notif/ /NotifReconnectDeadlockTest.java failed with NullPointerException + JDK-8335150: Test LogGeneratedClassesTest.java fails on rpmbuild mock enviroment + JDK-8335172: Add manual steps to run security/auth/callback/ /TextCallbackHandler/Password.java test + JDK-8335789: [TESTBUG] XparColor.java test fails with Error. Parse Exception: Invalid or unrecognized bugid: @ + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8336498: [macos] [build]: install-file macro may run into permission denied error + JDK-8336692: Redo fix for JDK-8284620 + JDK-8336942: Improve test coverage for class loading elements with annotations of different retentions + JDK-8337222: gc/TestDisableExplicitGC.java fails due to unexpected CodeCache GC + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8337826: Improve logging in OCSPTimeout and SimpleOCSPResponder to help diagnose JDK-8309754 + JDK-8337886: java/awt/Frame/MaximizeUndecoratedTest.java fails in OEL due to a slight color difference + JDK-8337951: Test sun/security/validator/samedn.sh CertificateNotYetValidException: NotBefore validation + JDK-8338100: C2: assert(!n_loop->is_member(get_loop(lca))) failed: control must not be back in the loop + JDK-8338426: Test java/nio/channels/Selector/WakeupNow.java failed + JDK-8338430: Improve compiler transformations + JDK-8338571: [TestBug] DefaultCloseOperation.java test not working as expected wrt instruction after JDK-8325851 fix + JDK-8338595: Add more linesize for MIME decoder in macro bench test Base64Decode + JDK-8338668: Test javax/swing/JFileChooser/8080628/ /bug8080628.java doesn't test for GTK L&F + JDK-8339154: Cleanups and JUnit conversion of test/jdk/java/util/zip/Available.java + JDK-8339261: Logs truncated in test javax/net/ssl/DTLS/DTLSRehandshakeTest.java + JDK-8339356: Test javax/net/ssl/SSLSocket/Tls13PacketSize.java failed with java.net.SocketException: An established connection was aborted by the software in your host machine + JDK-8339524: Clean up a few ExtendedRobot tests + JDK-8339687: Rearrange reachabilityFence()s in jdk.test.lib.util.ForceGC + JDK-8339728: [Accessibility,Windows,JAWS] Bug in the getKeyChar method of the AccessBridge class + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339883: Open source several AWT/2D related tests + JDK-8339902: Open source couple TextField related tests + JDK-8339943: Frame not disposed in java/awt/dnd/DropActionChangeTest.java + JDK-8340078: Open source several 2D tests + JDK-8340116: test/jdk/sun/security/tools/jarsigner/ /PreserveRawManifestEntryAndDigest.java can fail due to regex + JDK-8340411: open source several 2D imaging tests + JDK-8340480: Bad copyright notices in changes from JDK-8339902 + JDK-8340687: Open source closed frame tests #1 + JDK-8340719: Open source AWT List tests + JDK-8340969: jdk/jfr/startupargs/TestStartDuration.java should be marked as flagless + JDK-8341037: Use standard layouts in DefaultFrameIconTest.java and MenuCrash.java + JDK-8341111: open source several AWT tests including menu shortcut tests + JDK-8341316: [macos] javax/swing/ProgressMonitor/ /ProgressMonitorEscapeKeyPress.java fails sometimes in macos + JDK-8341412: Various test failures after JDK-8334305 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8341453: java/awt/a11y/AccessibleJTableTest.java fails in some cases where the test tables are not visible + JDK-8341722: Fix some warnings as errors when building on Linux with toolchain clang + JDK-8341881: [REDO] java/nio/file/attribute/ /BasicFileAttributeView/CreationTime.java#tmp fails on alinux3 + JDK-8341978: Improve JButton/bug4490179.java + JDK-8341982: Simplify JButton/bug4323121.java + JDK-8342098: Write a test to compare the images + JDK-8342145: File libCreationTimeHelper.c compile fails on Alpine + JDK-8342270: Test sun/security/pkcs11/Provider/ /RequiredMechCheck.java needs write access to src tree + JDK-8342498: Add test for Allocation elimination after use as alignment reference by SuperWord + JDK-8342508: Use latch in BasicMenuUI/bug4983388.java instead of delay + JDK-8342541: Exclude List/KeyEventsTest/KeyEventsTest.java from running on macOS + JDK-8342562: Enhance Deflater operations + JDK-8342602: Remove JButton/PressedButtonRightClickTest test + JDK-8342607: Enhance register printing on x86_64 platforms + JDK-8342609: jpackage test helper function incorrectly removes a directory instead of its contents only + JDK-8342634: javax/imageio/plugins/wbmp/ /WBMPStreamTruncateTest.java creates temp file in src dir + JDK-8342635: javax/swing/JFileChooser/FileSystemView/ /WindowsDefaultIconSizeTest.java creates tmp file in src dir + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8342811: java/net/httpclient/PlainProxyConnectionTest.java failed: Unexpected connection count: 5 + JDK-8342858: Make target mac-jdk-bundle fails on chmod command + JDK-8342988: GHA: Build JTReg in single step + JDK-8343007: Enhance Buffered Image handling + JDK-8343100: Consolidate EmptyFolderTest and EmptyFolderPackageTest jpackage tests into single java file + JDK-8343101: Rework BasicTest.testTemp test cases + JDK-8343118: [TESTBUG] java/awt/PrintJob/PrintCheckboxTest/ /PrintCheckboxManualTest.java fails with Error. Can't find HTML file PrintCheckboxManualTest.html + JDK-8343128: PassFailJFrame.java test result: Error. Bad action for script: build} + JDK-8343129: Disable unstable check of ThreadsListHandle.sanity_vm ThreadList values + JDK-8343178: Test BasicTest.java javac compile fails cannot find symbol + JDK-8343378: Exceptions in javax/management DeadLockTest.java do not cause test failure + JDK-8343491: javax/management/remote/mandatory/connection/ /DeadLockTest.java failing with NoSuchObjectException: no such object in table + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343724: [PPC64] Disallow OptoScheduling + JDK-8343882: BasicAnnoTests doesn't handle multiple annotations at the same position + JDK-8344581: [TESTBUG] java/awt/Robot/ /ScreenCaptureRobotTest.java failing on macOS + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8344646: The libjsig deprecation warning should go to stderr not stdout + JDK-8345296: AArch64: VM crashes with SIGILL when prctl is disallowed + JDK-8345368: java/io/File/createTempFile/SpecialTempFile.java fails on Windows Server 2025 + JDK-8345371: Bump update version for OpenJDK: jdk-17.0.15 + JDK-8345375: Improve debuggability of test/jdk/java/net/Socket/CloseAvailable.java + JDK-8345414: Google CAInterop test failures + JDK-8345468: test/jdk/javax/swing/JScrollBar/4865918/ /bug4865918.java fails in ubuntu22.04 + JDK-8346055: javax/swing/text/StyledEditorKit/4506788/ /bug4506788.java fails in ubuntu22.04 + JDK-8346324: javax/swing/JScrollBar/4865918/bug4865918.java fails in CI + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8346671: java/nio/file/Files/probeContentType/Basic.java fails on Windows 2025 + JDK-8346828: javax/swing/JScrollBar/4865918/bug4865918.java still fails in CI + JDK-8346887: DrawFocusRect() may cause an assertion failure + JDK-8346908: Update JDK 17 javadoc man page + JDK-8346972: Test java/nio/channels/FileChannel/ /LoopingTruncate.java fails sometimes with IOException: There is not enough space on the disk + JDK-8347424: Fix and rewrite sun/security/x509/DNSName/LeadingPeriod.java test + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347740: java/io/File/createTempFile/SpecialTempFile.java failing + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8348625: [21u, 17u] Revert JDK-8185862 to restore old java.awt.headless behavior on Windows + JDK-8348675: TrayIcon tests fail in Ubuntu 24.10 Wayland + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8353905: [17u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1490=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1490=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1490=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1490=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1490=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1490=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1490=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1490=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1490=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1490=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1490=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1490=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1490=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1490=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1490=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-jmods-17.0.15.0-150400.3.54.1 * java-17-openjdk-src-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * openSUSE Leap 15.4 (noarch) * java-17-openjdk-javadoc-17.0.15.0-150400.3.54.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-jmods-17.0.15.0-150400.3.54.1 * java-17-openjdk-src-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * openSUSE Leap 15.6 (noarch) * java-17-openjdk-javadoc-17.0.15.0-150400.3.54.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * SUSE Manager Proxy 4.3 (x86_64) * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 7 12:31:42 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 May 2025 12:31:42 -0000 Subject: SUSE-SU-2025:1487-1: important: Security update for java-11-openjdk Message-ID: <174662110252.30275.5941237220322993240@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:1487-1 Release Date: 2025-05-06T10:05:56Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.27+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-8195675: Call to insertText with single character from custom Input Method ignored + JDK-8202926: Test java/awt/Focus/ /WindowUpdateFocusabilityTest/ /WindowUpdateFocusabilityTest.html fails + JDK-8216539: tools/jar/modularJar/Basic.java timed out + JDK-8268364: jmethod clearing should be done during unloading + JDK-8273914: Indy string concat changes order of operations + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8306408: Fix the format of several tables in building.md + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8312049: runtime/logging/ClassLoadUnloadTest can be improved + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8327650: Test java/nio/channels/DatagramChannel/ /StressNativeSignal.java timed out + JDK-8328242: Add a log area to the PassFailJFrame + JDK-8331863: DUIterator_Fast used before it is constructed + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8338430: Improve compiler transformations + JDK-8339560: Unaddressed comments during code review of JDK-8337664 + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339931: Update problem list for WindowUpdateFocusabilityTest.java + JDK-8340387: Update OS detection code to recognize Windows Server 2025 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8342562: Enhance Deflater operations + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8343007: Enhance Buffered Image handling + JDK-8343474: [updates] Customize README.md to specifics of update project + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343786: [11u] GHA: Bump macOS and Xcode versions to macos-13 and XCode 14.3.1 + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8345509: Bump update version of OpenJDK: 11.0.27 + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8354087: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.27 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1487=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1487=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1487=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1487=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1487=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1487=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1487=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1487=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Manager Proxy 4.3 (x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-jmods-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-src-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * openSUSE Leap 15.6 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * SUSE Package Hub 15 15-SP6 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 7 12:31:47 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 May 2025 12:31:47 -0000 Subject: SUSE-RU-2025:1486-1: important: Recommended update for apparmor Message-ID: <174662110744.30275.15057321819096944436@smelt2.prg2.suse.org> # Recommended update for apparmor Announcement ID: SUSE-RU-2025:1486-1 Release Date: 2025-05-06T10:00:40Z Rating: important References: * bsc#1232234 * bsc#1234452 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for apparmor fixes the following issues: * Allow pam_unix to execute unix_chkpwd with abi/3.0 (bsc#1234452, bsc#1232234) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1486=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1486=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1486=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1486=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1486=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1486=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1486=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1486=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1486=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1486=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1486=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1486=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ruby-apparmor-3.0.4-150400.5.15.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * ruby-apparmor-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * perl-apparmor-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * perl-apparmor-debuginfo-3.0.4-150400.5.15.1 * openSUSE Leap 15.4 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * openSUSE Leap 15.4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * pam_apparmor-64bit-3.0.4-150400.5.15.1 * libapparmor1-64bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-64bit-3.0.4-150400.5.15.1 * pam_apparmor-64bit-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * perl-apparmor-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * perl-apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * perl-apparmor-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * perl-apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * perl-apparmor-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * perl-apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * perl-apparmor-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * perl-apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * SUSE Manager Proxy 4.3 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Manager Proxy 4.3 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-3.0.4-150400.5.15.1 * apparmor-parser-debuginfo-3.0.4-150400.5.15.1 * libapparmor-debugsource-3.0.4-150400.5.15.1 * apparmor-parser-3.0.4-150400.5.15.1 * pam_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-debuginfo-3.0.4-150400.5.15.1 * libapparmor-devel-3.0.4-150400.5.15.1 * apparmor-debugsource-3.0.4-150400.5.15.1 * apache2-mod_apparmor-3.0.4-150400.5.15.1 * python3-apparmor-3.0.4-150400.5.15.1 * libapparmor1-debuginfo-3.0.4-150400.5.15.1 * pam_apparmor-debuginfo-3.0.4-150400.5.15.1 * SUSE Manager Server 4.3 (noarch) * apparmor-abstractions-3.0.4-150400.5.15.1 * apparmor-utils-lang-3.0.4-150400.5.15.1 * apparmor-utils-3.0.4-150400.5.15.1 * apparmor-profiles-3.0.4-150400.5.15.1 * apparmor-parser-lang-3.0.4-150400.5.15.1 * apparmor-docs-3.0.4-150400.5.15.1 * SUSE Manager Server 4.3 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.15.1 * libapparmor1-32bit-3.0.4-150400.5.15.1 * pam_apparmor-32bit-3.0.4-150400.5.15.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232234 * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 7 16:30:18 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 May 2025 16:30:18 -0000 Subject: SUSE-SU-2025:1510-1: important: Security update for libsoup Message-ID: <174663541809.30275.6931522141382500587@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:1510-1 Release Date: 2025-05-07T14:38:17Z Rating: important References: * bsc#1240750 * bsc#1240752 * bsc#1240754 * bsc#1240756 * bsc#1240757 * bsc#1241162 * bsc#1241164 * bsc#1241214 * bsc#1241222 * bsc#1241226 * bsc#1241252 * bsc#1241263 * bsc#1241686 * bsc#1241688 Cross-References: * CVE-2025-2784 * CVE-2025-32050 * CVE-2025-32051 * CVE-2025-32052 * CVE-2025-32053 * CVE-2025-32906 * CVE-2025-32907 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-32914 * CVE-2025-46420 * CVE-2025-46421 CVSS scores: * CVE-2025-2784 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-2784 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-2784 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32050 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32050 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32050 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32051 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32051 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32051 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32052 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32052 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32052 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32053 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32907 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32907 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32907 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32914 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-32914 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46420 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46420 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46420 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46421 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46421 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 14 vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing conten (bsc#1240750) * CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752) * CVE-2025-32051: Fixed segmentation fault when parsing malformed data URI (bsc#1240754) * CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756) * CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757) * CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32910: Fixed NULL pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) * CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164) * CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686) * CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1510=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1510=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1510=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1510=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1510=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1510=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1510=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1510=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1510=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1510=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1510=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1510=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * openSUSE Leap 15.4 (x86_64) * libsoup-devel-32bit-3.0.4-150400.3.7.1 * libsoup-3_0-0-32bit-3.0.4-150400.3.7.1 * libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.7.1 * openSUSE Leap 15.4 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-devel-64bit-3.0.4-150400.3.7.1 * libsoup-3_0-0-64bit-3.0.4-150400.3.7.1 * libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.7.1 * libsoup-devel-3.0.4-150400.3.7.1 * libsoup-3_0-0-3.0.4-150400.3.7.1 * libsoup-debugsource-3.0.4-150400.3.7.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.7.1 * SUSE Manager Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2784.html * https://www.suse.com/security/cve/CVE-2025-32050.html * https://www.suse.com/security/cve/CVE-2025-32051.html * https://www.suse.com/security/cve/CVE-2025-32052.html * https://www.suse.com/security/cve/CVE-2025-32053.html * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32907.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-32914.html * https://www.suse.com/security/cve/CVE-2025-46420.html * https://www.suse.com/security/cve/CVE-2025-46421.html * https://bugzilla.suse.com/show_bug.cgi?id=1240750 * https://bugzilla.suse.com/show_bug.cgi?id=1240752 * https://bugzilla.suse.com/show_bug.cgi?id=1240754 * https://bugzilla.suse.com/show_bug.cgi?id=1240756 * https://bugzilla.suse.com/show_bug.cgi?id=1240757 * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241164 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241222 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1241686 * https://bugzilla.suse.com/show_bug.cgi?id=1241688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 7 16:30:26 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 07 May 2025 16:30:26 -0000 Subject: SUSE-SU-2025:1509-1: important: Security update for libsoup2 Message-ID: <174663542681.30275.690333997213275135@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2025:1509-1 Release Date: 2025-05-07T14:37:39Z Rating: important References: * bsc#1240750 * bsc#1240752 * bsc#1240756 * bsc#1240757 * bsc#1241164 * bsc#1241222 * bsc#1241686 * bsc#1241688 Cross-References: * CVE-2025-2784 * CVE-2025-32050 * CVE-2025-32052 * CVE-2025-32053 * CVE-2025-32907 * CVE-2025-32914 * CVE-2025-46420 * CVE-2025-46421 CVSS scores: * CVE-2025-2784 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-2784 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-2784 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32050 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32050 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32050 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32052 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32052 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32052 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32053 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32907 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32907 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32907 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32914 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-32914 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46420 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46420 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46420 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46421 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46421 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing conten (bsc#1240750) * CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752) * CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756) * CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757) * CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222) * CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164) * CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686) * CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1509=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1509=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1509=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1509=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1509=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1509=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1509=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1509=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1509=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1509=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1509=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1509=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1509=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1509=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1509=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1509=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1509=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Manager Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libsoup-2_4-1-32bit-2.74.2-150400.3.6.1 * libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.6.1 * libsoup2-devel-32bit-2.74.2-150400.3.6.1 * openSUSE Leap 15.4 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-2_4-1-64bit-2.74.2-150400.3.6.1 * libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.6.1 * libsoup2-devel-64bit-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.6.1 * libsoup-2_4-1-2.74.2-150400.3.6.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.6.1 * libsoup2-debugsource-2.74.2-150400.3.6.1 * libsoup2-devel-2.74.2-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2784.html * https://www.suse.com/security/cve/CVE-2025-32050.html * https://www.suse.com/security/cve/CVE-2025-32052.html * https://www.suse.com/security/cve/CVE-2025-32053.html * https://www.suse.com/security/cve/CVE-2025-32907.html * https://www.suse.com/security/cve/CVE-2025-32914.html * https://www.suse.com/security/cve/CVE-2025-46420.html * https://www.suse.com/security/cve/CVE-2025-46421.html * https://bugzilla.suse.com/show_bug.cgi?id=1240750 * https://bugzilla.suse.com/show_bug.cgi?id=1240752 * https://bugzilla.suse.com/show_bug.cgi?id=1240756 * https://bugzilla.suse.com/show_bug.cgi?id=1240757 * https://bugzilla.suse.com/show_bug.cgi?id=1241164 * https://bugzilla.suse.com/show_bug.cgi?id=1241222 * https://bugzilla.suse.com/show_bug.cgi?id=1241686 * https://bugzilla.suse.com/show_bug.cgi?id=1241688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 8 20:30:42 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 08 May 2025 20:30:42 -0000 Subject: SUSE-RU-2025:1513-1: moderate: Recommended update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Message-ID: <174673624244.28796.12778776941843744@smelt2.prg2.suse.org> # Recommended update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Announcement ID: SUSE-RU-2025:1513-1 Release Date: 2025-05-08T08:41:31Z Rating: moderate References: * jsc#MSQA-979 Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that contains one feature can now be installed. ## Recommended update 5.0.4 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: proxy-salt-broker-image: * Image rebuilt with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Server ### Description: This update fixes the following issues: server-image: * Image rebuilt with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: proxy-salt-broker-image: * Image rebuilt with updated dependencies ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1513=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1513=1 * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1513=1 ## Package List: * SUSE Manager Proxy 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Proxy 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Proxy 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Proxy 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Retail Branch Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Retail Branch Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Retail Branch Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.14.1 * SUSE Manager Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-server-image-5.0.4-7.19.1 * SUSE Manager Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-server-image-5.0.4-7.19.1 * SUSE Manager Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-server-image-5.0.4-7.19.1 * SUSE Manager Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-server-image-5.0.4-7.19.1 ## References: * https://jira.suse.com/browse/MSQA-979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 9 08:30:06 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 09 May 2025 08:30:06 -0000 Subject: SUSE-SU-2025:1521-1: important: Security update for tomcat Message-ID: <174677940641.20256.13219502318140223281@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:1521-1 Release Date: 2025-05-09T04:57:04Z Rating: important References: * bsc#1242008 * bsc#1242009 Cross-References: * CVE-2025-31650 * CVE-2025-31651 CVSS scores: * CVE-2025-31650 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-31650 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31650 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31650 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31651 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31651 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31651 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-31651 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: Update to Tomcat 9.0.104 * CVE-2025-31650: invalid priority field values should be ignored (bsc#1242008) * CVE-2025-31651: Better handling of URLs with literal ';' and '?' (bsc#1242009) Full changelog: https://tomcat.apache.org/tomcat-9.0-doc/changelog.htm ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1521=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1521=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1521=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1521=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1521=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1521=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1521=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1521=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1521=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1521=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1521=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1521=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1521=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1521=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1521=1 ## Package List: * openSUSE Leap 15.6 (noarch) * tomcat-docs-webapp-9.0.104-150200.81.1 * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * tomcat-embed-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-jsvc-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-javadoc-9.0.104-150200.81.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Manager Server 4.3 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 * SUSE Enterprise Storage 7.1 (noarch) * tomcat-el-3_0-api-9.0.104-150200.81.1 * tomcat-9.0.104-150200.81.1 * tomcat-servlet-4_0-api-9.0.104-150200.81.1 * tomcat-jsp-2_3-api-9.0.104-150200.81.1 * tomcat-webapps-9.0.104-150200.81.1 * tomcat-admin-webapps-9.0.104-150200.81.1 * tomcat-lib-9.0.104-150200.81.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31650.html * https://www.suse.com/security/cve/CVE-2025-31651.html * https://bugzilla.suse.com/show_bug.cgi?id=1242008 * https://bugzilla.suse.com/show_bug.cgi?id=1242009 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 14 12:30:02 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 14 May 2025 12:30:02 -0000 Subject: SUSE-RU-2025:1372-2: moderate: Recommended update for patterns-base Message-ID: <174722580298.14447.12728504527350558054@smelt2.prg2.suse.org> # Recommended update for patterns-base Announcement ID: SUSE-RU-2025:1372-2 Release Date: 2025-05-14T09:25:03Z Rating: moderate References: * jsc#PED-8375 Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for patterns-base fixes the following issues: * add bpftool to patterns enhanced base. jsc#PED-8375 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1372=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1372=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1372=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1372=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1372=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1372=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1372=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1372=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1372=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1372=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1372=1 ## Package List: * SUSE Manager Server 4.3 (ppc64le x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-base-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-base-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-base-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-transactional_base-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-base-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * patterns-base-x11_raspberrypi-20200124-150400.20.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-base-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * SUSE Manager Proxy 4.3 (x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * patterns-base-base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-20200124-150400.20.13.1 * patterns-base-x11-20200124-150400.20.13.1 * patterns-base-apparmor-32bit-20200124-150400.20.13.1 * patterns-base-sw_management-20200124-150400.20.13.1 * patterns-base-basic_desktop-20200124-150400.20.13.1 * patterns-base-sw_management-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-32bit-20200124-150400.20.13.1 * patterns-base-fips-20200124-150400.20.13.1 * patterns-base-basesystem-20200124-150400.20.13.1 * patterns-base-base-32bit-20200124-150400.20.13.1 * patterns-base-enhanced_base-32bit-20200124-150400.20.13.1 * patterns-base-x11-32bit-20200124-150400.20.13.1 * patterns-base-apparmor-20200124-150400.20.13.1 * patterns-base-fips-certified-20200124-150400.20.13.1 * patterns-base-bootloader-20200124-150400.20.13.1 * patterns-base-documentation-20200124-150400.20.13.1 * patterns-base-32bit-20200124-150400.20.13.1 * patterns-base-minimal_base-20200124-150400.20.13.1 * patterns-base-x11_enhanced-20200124-150400.20.13.1 ## References: * https://jira.suse.com/browse/PED-8375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 14 12:30:12 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 14 May 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1549-1: moderate: Security update for apparmor Message-ID: <174722581297.14447.13799996760269854971@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1549-1 Release Date: 2025-05-14T09:06:46Z Rating: moderate References: * bsc#1241678 Cross-References: * CVE-2024-10041 CVSS scores: * CVE-2024-10041 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-10041 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-10041 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for apparmor fixes the following issues: * Add dac_read_search capability for unix_chkpwd to allow it to read the shadow file even if it has 000 permissions. This is needed after the CVE-2024-10041 fix in PAM. (bsc#1241678) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1549=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1549=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1549=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1549=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1549=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1549=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1549=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1549=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1549=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1549=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1549=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1549=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * apparmor-debugsource-3.0.4-150400.5.18.1 * ruby-apparmor-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * perl-apparmor-debuginfo-3.0.4-150400.5.18.1 * perl-apparmor-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * ruby-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * openSUSE Leap 15.4 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * openSUSE Leap 15.4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * openSUSE Leap 15.4 (aarch64_ilp32) * pam_apparmor-64bit-3.0.4-150400.5.18.1 * libapparmor1-64bit-3.0.4-150400.5.18.1 * pam_apparmor-64bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-64bit-debuginfo-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * perl-apparmor-3.0.4-150400.5.18.1 * perl-apparmor-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * perl-apparmor-3.0.4-150400.5.18.1 * perl-apparmor-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * perl-apparmor-3.0.4-150400.5.18.1 * perl-apparmor-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * perl-apparmor-3.0.4-150400.5.18.1 * perl-apparmor-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * SUSE Manager Proxy 4.3 (x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Manager Proxy 4.3 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-debugsource-3.0.4-150400.5.18.1 * libapparmor-devel-3.0.4-150400.5.18.1 * pam_apparmor-3.0.4-150400.5.18.1 * python3-apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-debuginfo-3.0.4-150400.5.18.1 * python3-apparmor-3.0.4-150400.5.18.1 * libapparmor1-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-3.0.4-150400.5.18.1 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.18.1 * apache2-mod_apparmor-3.0.4-150400.5.18.1 * pam_apparmor-debuginfo-3.0.4-150400.5.18.1 * apparmor-parser-3.0.4-150400.5.18.1 * SUSE Manager Server 4.3 (noarch) * apparmor-profiles-3.0.4-150400.5.18.1 * apparmor-parser-lang-3.0.4-150400.5.18.1 * apparmor-abstractions-3.0.4-150400.5.18.1 * apparmor-docs-3.0.4-150400.5.18.1 * apparmor-utils-3.0.4-150400.5.18.1 * apparmor-utils-lang-3.0.4-150400.5.18.1 * SUSE Manager Server 4.3 (x86_64) * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.18.1 * libapparmor1-32bit-3.0.4-150400.5.18.1 * libapparmor1-32bit-debuginfo-3.0.4-150400.5.18.1 * pam_apparmor-32bit-3.0.4-150400.5.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10041.html * https://bugzilla.suse.com/show_bug.cgi?id=1241678 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 19 08:30:17 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 May 2025 08:30:17 -0000 Subject: SUSE-SU-2025:1576-1: moderate: Security update for openssh Message-ID: <174764341704.14447.7614207018690845139@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:1576-1 Release Date: 2025-05-19T04:49:29Z Rating: moderate References: * bsc#1228634 * bsc#1232533 * bsc#1241012 * bsc#1241045 Cross-References: * CVE-2025-32728 CVSS scores: * CVE-2025-32728 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-32728 ( SUSE ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-32728 ( NVD ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has three security fixes can now be installed. ## Description: This update for openssh fixes the following issues: * Security issues fixed: * CVE-2025-32728: Fixed a logic error in DisableForwarding option (bsc#1241012) * Other bugs fixed: * Allow KEX hashes greater than 256 bits (bsc#1241045) * Fixed hostname being left out of the audit output (bsc#1228634) * Fixed failures with very large MOTDs (bsc#1232533) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1576=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1576=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1576=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1576=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1576=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1576=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1576=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1576=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1576=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1576=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1576=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1576=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1576=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1576=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1576=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1576=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1576=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1576=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1576=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1576=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1576=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1576=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1576=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1576=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-cavs-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-cavs-debuginfo-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Manager Proxy 4.3 (x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-helpers-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-helpers-debuginfo-8.4p1-150300.3.49.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * openssh-server-debuginfo-8.4p1-150300.3.49.1 * openssh-clients-8.4p1-150300.3.49.1 * openssh-debuginfo-8.4p1-150300.3.49.1 * openssh-8.4p1-150300.3.49.1 * openssh-common-8.4p1-150300.3.49.1 * openssh-common-debuginfo-8.4p1-150300.3.49.1 * openssh-debugsource-8.4p1-150300.3.49.1 * openssh-fips-8.4p1-150300.3.49.1 * openssh-server-8.4p1-150300.3.49.1 * openssh-clients-debuginfo-8.4p1-150300.3.49.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32728.html * https://bugzilla.suse.com/show_bug.cgi?id=1228634 * https://bugzilla.suse.com/show_bug.cgi?id=1232533 * https://bugzilla.suse.com/show_bug.cgi?id=1241012 * https://bugzilla.suse.com/show_bug.cgi?id=1241045 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 19 16:30:15 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 19 May 2025 16:30:15 -0000 Subject: SUSE-RU-2025:1580-1: important: Recommended update for librdkafka Message-ID: <174767221565.14417.1554208527421922753@smelt2.prg2.suse.org> # Recommended update for librdkafka Announcement ID: SUSE-RU-2025:1580-1 Release Date: 2025-05-19T13:12:32Z Rating: important References: * bsc#1242842 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for librdkafka fixes the following issues: * Avoid endless loops under certain conditions (bsc#1242842) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1580=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1580=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1580=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1580=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1580=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1580=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1580=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1580=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1580=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1580=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1580=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1580=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1580=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1580=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1580=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Manager Proxy 4.3 (x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * librdkafka-devel-0.11.6-150000.1.11.1 * librdkafka1-debuginfo-0.11.6-150000.1.11.1 * librdkafka-debugsource-0.11.6-150000.1.11.1 * librdkafka1-0.11.6-150000.1.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 12:31:12 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 12:31:12 -0000 Subject: SUSE-RU-2025:01632-1: moderate: Recommended update for grub2 Message-ID: <174783067284.21669.16728846551272700101@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2025:01632-1 Release Date: 2025-05-21T10:04:51Z Rating: moderate References: * jsc#PED-12028 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that contains one feature can now be installed. ## Description: This update for grub2 rebuilds the existing package with the new 4k RSA secure boot key for IBM Power and Z. Note: the signing key of x86 / x86_64 and aarch64 architectures are unchanged. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1632=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1632=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1632=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1632=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1632=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1632=1 * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1632=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1632=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1632=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1632=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1632=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1632=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1632=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1632=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * grub2-debuginfo-2.06-150400.11.60.1 * grub2-branding-upstream-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * openSUSE Leap 15.4 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150400.11.60.1 * openSUSE Leap 15.4 (noarch) * grub2-i386-pc-debug-2.06-150400.11.60.1 * grub2-i386-pc-extras-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-x86_64-efi-extras-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-arm64-efi-debug-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * grub2-i386-efi-debug-2.06-150400.11.60.1 * grub2-x86_64-xen-extras-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-2.06-150400.11.60.1 * grub2-s390x-emu-extras-2.06-150400.11.60.1 * grub2-i386-xen-extras-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-debug-2.06-150400.11.60.1 * grub2-i386-efi-extras-2.06-150400.11.60.1 * grub2-arm64-efi-extras-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-extras-2.06-150400.11.60.1 * grub2-x86_64-efi-debug-2.06-150400.11.60.1 * grub2-i386-xen-2.06-150400.11.60.1 * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-i386-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * openSUSE Leap 15.4 (s390x) * grub2-s390x-emu-debug-2.06-150400.11.60.1 * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Manager Proxy 4.3 Module (noarch) * grub2-arm64-efi-2.06-150400.11.60.1 * SUSE Manager Server 4.3 Module (noarch) * grub2-powerpc-ieee1275-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-arm64-efi-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * grub2-debugsource-2.06-150400.11.60.1 * SUSE Manager Proxy 4.3 (x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Manager Proxy 4.3 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * grub2-debugsource-2.06-150400.11.60.1 * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * grub2-debuginfo-2.06-150400.11.60.1 * grub2-2.06-150400.11.60.1 * SUSE Manager Server 4.3 (noarch) * grub2-snapper-plugin-2.06-150400.11.60.1 * grub2-systemd-sleep-plugin-2.06-150400.11.60.1 * grub2-powerpc-ieee1275-2.06-150400.11.60.1 * grub2-x86_64-efi-2.06-150400.11.60.1 * grub2-x86_64-xen-2.06-150400.11.60.1 * grub2-i386-pc-2.06-150400.11.60.1 * SUSE Manager Server 4.3 (s390x x86_64) * grub2-debugsource-2.06-150400.11.60.1 * SUSE Manager Server 4.3 (s390x) * grub2-s390x-emu-2.06-150400.11.60.1 ## References: * https://jira.suse.com/browse/PED-12028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 12:31:15 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 12:31:15 -0000 Subject: SUSE-SU-2025:01631-1: moderate: Security update for s390-tools Message-ID: <174783067558.21669.695193340970480180@smelt2.prg2.suse.org> # Security update for s390-tools Announcement ID: SUSE-SU-2025:01631-1 Release Date: 2025-05-21T10:03:45Z Rating: moderate References: * bsc#1242622 * jsc#PED-12028 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Manager Server 4.3 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for s390-tools rebuilds the existing package with the new 4k RSA secure boot key. Security issues fixed: * CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate. (bsc#1242622) Other issues: * Added the new IBM z17 (9175) processor type ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1631=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1631=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1631=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1631=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1631=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1631=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1631=1 ## Package List: * openSUSE Leap 15.4 (s390x x86_64) * s390-tools-debugsource-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * openSUSE Leap 15.4 (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * libkmipclient1-devel-2.31.0-150400.7.31.1 * openSUSE Leap 15.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Manager Server 4.3 (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Manager Server 4.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242622 * https://jira.suse.com/browse/PED-12028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 12:31:18 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 12:31:18 -0000 Subject: SUSE-RU-2025:01629-1: moderate: Recommended update for oracleasm Message-ID: <174783067834.21669.13001282866089749514@smelt2.prg2.suse.org> # Recommended update for oracleasm Announcement ID: SUSE-RU-2025:01629-1 Release Date: 2025-05-21T10:03:18Z Rating: moderate References: * jsc#PED-12028 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for oracleasm rebuilds the existing package with the new 4k RSA secure boot key for IBM Power and Z. Note: the signing key of x86 / x86_64 and aarch64 architectures are unchanged. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1629=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1629=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1629=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1629=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1629=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1629=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1629=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1629=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * oracleasm-debugsource-2.0.8-150400.25.9.1 * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * openSUSE Leap 15.4 (aarch64) * oracleasm-kmp-64kb-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-64kb-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Manager Proxy 4.3 (x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 * oracleasm-kmp-default-debuginfo-2.0.8_k5.14.21_150400.24.161-150400.25.9.1 ## References: * https://jira.suse.com/browse/PED-12028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 12:31:19 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 12:31:19 -0000 Subject: SUSE-RU-2025:01628-1: moderate: Recommended update for dpdk Message-ID: <174783067996.21669.11409978772475091163@smelt2.prg2.suse.org> # Recommended update for dpdk Announcement ID: SUSE-RU-2025:01628-1 Release Date: 2025-05-21T10:02:48Z Rating: moderate References: * jsc#PED-12028 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for dpdk rebuilds the existing package with the new 4k RSA secure boot key for IBM Power and Z. Note: the signing key of x86 / x86_64 and aarch64 architectures are unchanged. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1628=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1628=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1628=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1628=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1628=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1628=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1628=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1628=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-examples-debuginfo-19.11.10-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * dpdk-examples-19.11.10-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * openSUSE Leap 15.4 (noarch) * dpdk-doc-19.11.10-150400.4.20.1 * dpdk-thunderx-doc-19.11.10-150400.4.20.1 * openSUSE Leap 15.4 (aarch64) * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-thunderx-tools-19.11.10-150400.4.20.1 * dpdk-thunderx-devel-19.11.10-150400.4.20.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-examples-19.11.10-150400.4.20.1 * dpdk-thunderx-19.11.10-150400.4.20.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-thunderx-devel-19.11.10-150400.4.20.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-19.11.10-150400.4.20.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-thunderx-devel-19.11.10-150400.4.20.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-19.11.10-150400.4.20.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-thunderx-devel-19.11.10-150400.4.20.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.20.1 * dpdk-thunderx-19.11.10-150400.4.20.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.20.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Manager Proxy 4.3 (x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-tools-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.20.1 * libdpdk-20_0-19.11.10-150400.4.20.1 * dpdk-debugsource-19.11.10-150400.4.20.1 * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.161-150400.4.20.1 * dpdk-devel-debuginfo-19.11.10-150400.4.20.1 * dpdk-19.11.10-150400.4.20.1 * dpdk-tools-19.11.10-150400.4.20.1 * dpdk-devel-19.11.10-150400.4.20.1 * dpdk-debuginfo-19.11.10-150400.4.20.1 ## References: * https://jira.suse.com/browse/PED-12028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 12:31:36 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 12:31:36 -0000 Subject: SUSE-SU-2025:01627-1: important: Security update for the Linux Kernel Message-ID: <174783069627.21669.10546112591843466513@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01627-1 Release Date: 2025-05-21T10:02:18Z Rating: important References: * bsc#1201855 * bsc#1230771 * bsc#1238471 * bsc#1238512 * bsc#1238747 * bsc#1238865 * bsc#1239968 * bsc#1240188 * bsc#1240195 * bsc#1240553 * bsc#1240747 * bsc#1240835 * bsc#1241280 * bsc#1241371 * bsc#1241421 * bsc#1241433 * bsc#1241541 Cross-References: * CVE-2021-47671 * CVE-2022-49741 * CVE-2024-46784 * CVE-2025-21726 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21812 * CVE-2025-21886 * CVE-2025-22004 * CVE-2025-22020 * CVE-2025-22045 * CVE-2025-22055 * CVE-2025-22097 CVSS scores: * CVE-2021-47671 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47671 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 13 vulnerabilities and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865). * CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22097: drm/vkms: Fix use after free and double free on init error (bsc#1241541). The following non-security bugs were fixed: * scsi: smartpqi: Add ctrl ready timeout module parameter (jsc#PED-1557, bsc#1201855, bsc#1240553). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1627=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1627=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1627=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1627=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1627=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1627=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1627=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1627=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1627=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1627=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1627=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1627=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1627=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1627=1 ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.164.1 * kernel-source-vanilla-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-source-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150400.24.164.1 * kernel-debug-devel-5.14.21-150400.24.164.1 * kernel-debug-debuginfo-5.14.21-150400.24.164.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.164.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.164.1 * kernel-kvmsmall-devel-5.14.21-150400.24.164.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.164.1 * kernel-default-livepatch-5.14.21-150400.24.164.1 * kernel-obs-build-5.14.21-150400.24.164.1 * dlm-kmp-default-5.14.21-150400.24.164.1 * kernel-obs-build-debugsource-5.14.21-150400.24.164.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.164.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.164.1 * kernel-default-extra-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.164.1 * kselftests-kmp-default-5.14.21-150400.24.164.1 * gfs2-kmp-default-5.14.21-150400.24.164.1 * reiserfs-kmp-default-5.14.21-150400.24.164.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.164.1 * kernel-obs-qa-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * cluster-md-kmp-default-5.14.21-150400.24.164.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.164.1 * ocfs2-kmp-default-5.14.21-150400.24.164.1 * kernel-default-optional-5.14.21-150400.24.164.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.164.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_164-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.164.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.164.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (aarch64) * dtb-xilinx-5.14.21-150400.24.164.1 * kernel-64kb-extra-5.14.21-150400.24.164.1 * dtb-hisilicon-5.14.21-150400.24.164.1 * cluster-md-kmp-64kb-5.14.21-150400.24.164.1 * dtb-rockchip-5.14.21-150400.24.164.1 * ocfs2-kmp-64kb-5.14.21-150400.24.164.1 * dtb-broadcom-5.14.21-150400.24.164.1 * dtb-lg-5.14.21-150400.24.164.1 * dtb-nvidia-5.14.21-150400.24.164.1 * dtb-socionext-5.14.21-150400.24.164.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * dtb-freescale-5.14.21-150400.24.164.1 * dtb-arm-5.14.21-150400.24.164.1 * dtb-renesas-5.14.21-150400.24.164.1 * dlm-kmp-64kb-5.14.21-150400.24.164.1 * gfs2-kmp-64kb-5.14.21-150400.24.164.1 * kernel-64kb-debugsource-5.14.21-150400.24.164.1 * dtb-apple-5.14.21-150400.24.164.1 * dtb-apm-5.14.21-150400.24.164.1 * dtb-allwinner-5.14.21-150400.24.164.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-devel-5.14.21-150400.24.164.1 * dtb-cavium-5.14.21-150400.24.164.1 * dtb-exynos-5.14.21-150400.24.164.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.164.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-debuginfo-5.14.21-150400.24.164.1 * dtb-amlogic-5.14.21-150400.24.164.1 * reiserfs-kmp-64kb-5.14.21-150400.24.164.1 * dtb-qcom-5.14.21-150400.24.164.1 * kselftests-kmp-64kb-5.14.21-150400.24.164.1 * dtb-sprd-5.14.21-150400.24.164.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * dtb-amazon-5.14.21-150400.24.164.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.164.1 * dtb-mediatek-5.14.21-150400.24.164.1 * dtb-altera-5.14.21-150400.24.164.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.164.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-optional-5.14.21-150400.24.164.1 * dtb-amd-5.14.21-150400.24.164.1 * dtb-marvell-5.14.21-150400.24.164.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-5.14.21-150400.24.164.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-livepatch-devel-5.14.21-150400.24.164.1 * kernel-livepatch-5_14_21-150400_24_164-default-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.14.21-150400.24.164.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.164.1 * ocfs2-kmp-default-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * dlm-kmp-default-5.14.21-150400.24.164.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.164.1 * gfs2-kmp-default-5.14.21-150400.24.164.1 * cluster-md-kmp-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-debugsource-5.14.21-150400.24.164.1 * kernel-64kb-devel-5.14.21-150400.24.164.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-obs-build-5.14.21-150400.24.164.1 * kernel-obs-build-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-debugsource-5.14.21-150400.24.164.1 * kernel-64kb-devel-5.14.21-150400.24.164.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-obs-build-5.14.21-150400.24.164.1 * kernel-obs-build-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.164.1 * kernel-64kb-debugsource-5.14.21-150400.24.164.1 * kernel-64kb-devel-5.14.21-150400.24.164.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-obs-build-5.14.21-150400.24.164.1 * kernel-obs-build-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.164.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-5.14.21-150400.24.164.1 * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-obs-build-5.14.21-150400.24.164.1 * kernel-obs-build-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.164.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.164.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.164.1 * kernel-syms-5.14.21-150400.24.164.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.164.1 * kernel-default-devel-5.14.21-150400.24.164.1 * kernel-default-debuginfo-5.14.21-150400.24.164.1 * SUSE Manager Server 4.3 (noarch) * kernel-source-5.14.21-150400.24.164.1 * kernel-macros-5.14.21-150400.24.164.1 * kernel-devel-5.14.21-150400.24.164.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.164.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.164.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.164.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47671.html * https://www.suse.com/security/cve/CVE-2022-49741.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://bugzilla.suse.com/show_bug.cgi?id=1201855 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240195 * https://bugzilla.suse.com/show_bug.cgi?id=1240553 * https://bugzilla.suse.com/show_bug.cgi?id=1240747 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241421 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 21 16:30:25 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 21 May 2025 16:30:25 -0000 Subject: SUSE-RU-2025:01642-1: important: Recommended update for libsolv, libzypp, zypper Message-ID: <174784502513.29241.9062185999886256230@smelt2.prg2.suse.org> # Recommended update for libsolv, libzypp, zypper Announcement ID: SUSE-RU-2025:01642-1 Release Date: 2025-05-21T14:32:20Z Rating: important References: * bsc#1222044 * bsc#1230267 * bsc#1235598 * bsc#1237172 * bsc#1237587 * bsc#1237949 * bsc#1238315 * bsc#1239809 * bsc#1240529 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has nine fixes can now be installed. ## Description: This update for libsolv, libzypp, zypper fixes the following issues: * build both static and dynamic libraries on new suse distros * support the apk package and repository format (both v2 and v3) * new dataiterator_final_{repo,solvable} functions * Provide a symbol specific for the ruby-version so yast does not break across updates (bsc#1235598) * XmlReader: Fix detection of bad input streams * rpm: Fix detection of %triggerscript starts (bsc#1222044) * RepoindexFileReader: add more related attributes a service may set. * Drop workaround for broken rpm-4.18 in Code16 (bsc#1237172) * BuildRequires: %{libsolv_devel_package} >= 0.7.32. * Drop usage of SHA1 hash algorithm because it will become unavailable in FIPS mode (bsc#1240529) * Fix zypp.conf dupAllowVendorChange to reflect the correct default (false). * zypp.conf: Add `lock_timeout` ($ZYPP_LOCK_TIMEOUT) (bsc#1239809) * Fix computation of RepStatus if Repo URLs change. * Fix lost double slash when appending to an absolute FTP url (bsc#1238315) * Add a transaction package preloader * RpmPkgSigCheck_test: Exchange the test package signingkey * Exclude MediaCurl tests if DISABLE_MEDIABACKEND_TESTS * Strip a mediahandler tag from baseUrl querystrings. * Updated translations (bsc#1230267) * Do not double encode URL strings passed on the commandline (bsc#1237587) * Package preloader that concurrently downloads files. * BuildRequires: libzypp-devel >= 17.36.4. * refresh: add --include-all-archs * info,search: add option to search and list Enhances (bsc#1237949) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1642=1 SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 SUSE-SLE-Product-SUSE- Manager-Server-4.3-2025-1642=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1642=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 SUSE-SLE-Product- SLES_SAP-15-SP4-2025-1642=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-1642=1 SUSE-SLE-Product-SUSE- Manager-Proxy-4.3-2025-1642=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1642=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1642=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1642=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1642=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1642=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1642=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1642=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Manager Server 4.3 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * perl-solv-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * python311-solv-debuginfo-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-demo-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * libsolv-demo-debuginfo-0.7.32-150400.3.35.1 * python311-solv-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * perl-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-doc-17.36.7-150400.3.119.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * openSUSE Leap 15.4 (noarch) * zypper-aptitude-1.14.89-150400.3.82.1 * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64) * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le) * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * perl-solv-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * perl-solv-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Manager Proxy 4.3 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-17.36.7-150400.3.119.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * libsolv-tools-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * perl-solv-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * perl-solv-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * perl-solv-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * perl-solv-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsolv-devel-debuginfo-0.7.32-150400.3.35.1 * libzypp-debugsource-17.36.7-150400.3.119.1 * zypper-debuginfo-1.14.89-150400.3.82.1 * ruby-solv-0.7.32-150400.3.35.1 * libsolv-debuginfo-0.7.32-150400.3.35.1 * perl-solv-0.7.32-150400.3.35.1 * libsolv-tools-base-0.7.32-150400.3.35.1 * libsolv-debugsource-0.7.32-150400.3.35.1 * python3-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-17.36.7-150400.3.119.1 * libsolv-tools-base-debuginfo-0.7.32-150400.3.35.1 * zypper-debugsource-1.14.89-150400.3.82.1 * ruby-solv-debuginfo-0.7.32-150400.3.35.1 * libzypp-devel-17.36.7-150400.3.119.1 * libzypp-debuginfo-17.36.7-150400.3.119.1 * libsolv-devel-0.7.32-150400.3.35.1 * libsolv-tools-debuginfo-0.7.32-150400.3.35.1 * python3-solv-0.7.32-150400.3.35.1 * libsolv-tools-0.7.32-150400.3.35.1 * perl-solv-debuginfo-0.7.32-150400.3.35.1 * zypper-1.14.89-150400.3.82.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * zypper-log-1.14.89-150400.3.82.1 * zypper-needs-restarting-1.14.89-150400.3.82.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222044 * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1235598 * https://bugzilla.suse.com/show_bug.cgi?id=1237172 * https://bugzilla.suse.com/show_bug.cgi?id=1237587 * https://bugzilla.suse.com/show_bug.cgi?id=1237949 * https://bugzilla.suse.com/show_bug.cgi?id=1238315 * https://bugzilla.suse.com/show_bug.cgi?id=1239809 * https://bugzilla.suse.com/show_bug.cgi?id=1240529 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 22 08:30:12 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 22 May 2025 08:30:12 -0000 Subject: SUSE-RU-2025:01648-1: moderate: Recommended update for kbd Message-ID: <174790261215.21953.3955761297919171185@smelt2.prg2.suse.org> # Recommended update for kbd Announcement ID: SUSE-RU-2025:01648-1 Release Date: 2025-05-21T20:44:25Z Rating: moderate References: * bsc#1237230 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for kbd fixes the following issues: * Don't search for resources in the current directory. It can cause unwanted side effects or even infinite loop (bsc#1237230). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1648=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1648=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1648=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1648=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1648=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1648=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1648=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1648=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1648=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1648=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1648=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1648=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1648=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1648=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1648=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1648=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1648=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1648=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1648=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Manager Proxy 4.3 (x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Manager Proxy 4.3 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Manager Server 4.3 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * openSUSE Leap 15.4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * openSUSE Leap 15.6 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * Basesystem Module 15-SP6 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kbd-2.4.0-150400.5.9.1 * kbd-debuginfo-2.4.0-150400.5.9.1 * kbd-debugsource-2.4.0-150400.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kbd-legacy-2.4.0-150400.5.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237230 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 22 12:30:18 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 22 May 2025 12:30:18 -0000 Subject: SUSE-SU-2025:01651-1: moderate: Security update for ucode-intel Message-ID: <174791701849.24910.1587792649440197320@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:01651-1 Release Date: 2025-05-22T08:53:02Z Rating: moderate References: * bsc#1243123 Cross-References: * CVE-2024-28956 * CVE-2024-43420 * CVE-2024-45332 * CVE-2025-20012 * CVE-2025-20054 * CVE-2025-20103 * CVE-2025-20623 * CVE-2025-24495 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-20012 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( NVD ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20012 ( NVD ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20054 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20054 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20103 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20103 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20623 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20623 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-24495 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24495 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: Intel CPU Microcode was updated to the 20250512 release (bsc#1243123) * CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access. * Updates for functional issues. * New Platforms | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | ARL-U | A1 | 06-b5-00/80 | | 0000000a | Core Ultra Processor (Series2) | ARL-S/HX (8P) | B0 | 06-c6-02/82 | | 00000118 | Core Ultra Processor (Series2) | ARL-H | A1 | 06-c5-02/82 | | 00000118 | Core Ultra Processor (Series2) | GNR- AP/SP | B0 | 06-ad-01/95 | | 010003a2 | Xeon Scalable Gen6 | GNR-AP/SP | H0 | 06-ad-01/20 | | 0a0000d1 | Xeon Scalable Gen6 | LNL | B0 | 06-bd-01/80 | | 0000011f | Core Ultra 200 V Series Processor * Updated Platforms | Processor | Stepping | F-M-S/PI | Old Ver | New Ver | Products |:---------------|:---------|:------------|:---------|:---------|:--------- | ADL | C0 | 06-97-02/07 | 00000038 | 0000003a | Core Gen12 | ADL | H0 | 06-97-05/07 | 00000038 | 0000003a | Core Gen12 | ADL | L0 | 06-9a-03/80 | 00000436 | 00000437 | Core Gen12 | ADL | R0 | 06-9a-04/80 | 00000436 | 00000437 | Core Gen12 | ADL-N | N0 | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E | AML-Y42 | V0 | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile | AZB | A0/R0 | 06-9a-04/40 | 00000009 | 0000000a | Intel(R) Atom(R) C1100 | CFL-H | R0 | 06-9e-0d/22 | 00000102 | 00000104 | Core Gen9 Mobile | CLX-SP | B1 | 06-55-07/bf | 05003707 | 05003901 | Xeon Scalable Gen2 | CML-H | R1 | 06-a5-02/20 | 000000fc | 00000100 | Core Gen10 Mobile | CML-S102 | Q0 | 06-a5-05/22 | 000000fc | 00000100 | Core Gen10 | CML-S62 | G1 | 06-a5-03/22 | 000000fc | 00000100 | Core Gen10 | CML-U42 | V0 | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile | CML-U62 V1 | A0 | 06-a6-00/80 | 000000fe | 00000102 | Core Gen10 Mobile | CML-U62 V2 | K1 | 06-a6-01/80 | 000000fc | 00000100 | Core Gen10 Mobile | CML-Y42 | V0 | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile | CPX-SP | A1 | 06-55-0b/bf | 07002904 | 07002b01 | Xeon Scalable Gen3 | EMR-SP | A1 | 06-cf-02/87 | 21000291 | 210002a9 | Xeon Scalable Gen5 | GLK-R | R0 | 06-7a-08/01 | 00000024 | 00000026 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 | ICL-D | B0 | 06-6c-01/10 | 010002c0 | 010002d0 | Xeon D-17xx, D-27xx | ICL-U/Y | D1 | 06-7e-05/80 | 000000c6 | 000000ca | Core Gen10 Mobile | ICX-SP | Dx/M1 | 06-6a-06/87 | 0d0003f5 | 0d000404 | Xeon Scalable Gen3 | MTL | C0 | 06-aa-04/e6 | 00000020 | 00000024 | Core Ultra Processor | RKL-S | B0 | 06-a7-01/02 | 00000063 | 00000064 | Core Gen11 | RPL-E/HX/S | B0 | 06-b7-01/32 | 0000012c | 0000012f | Core Gen13/Gen14 | RPL-H/P/PX 6+8 | J0 | 06-ba-02/e0 | 00004124 | 00004128 | Core Gen13 | RPL-HX/S | C0 | 06-bf-02/07 | 00000038 | 0000003a | Core Gen13/Gen14 | RPL-S | H0 | 06-bf-05/07 | 00000038 | 0000003a | Core Gen13/Gen14 | RPL-U 2+8 | Q0 | 06-ba-03/e0 | 00004124 | 00004128 | Core Gen13 | SPR-HBM | Bx | 06-8f-08/10 | 2c0003e0 | 2c0003f7 | Xeon Max | SPR-SP | E4/S2 | 06-8f-07/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4 | SPR-SP | E5/S3 | 06-8f-08/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4 | SRF-SP | C0 | 06-af-03/01 | 03000330 | 03000341 | Xeon 6700-Series Processors with E-Cores | TGL | B0/B1 | 06-8c-01/80 | 000000b8 | 000000bc | Core Gen11 Mobile | TGL-H | R0 | 06-8d-01/c2 | 00000052 | 00000056 | Core Gen11 Mobile | TGL-R | C0 | 06-8c-02/c2 | 00000038 | 0000003c | Core Gen11 Mobile | TWL | N0 | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E | WHL-U | V0 | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen8 Mobile ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1651=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1651=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1651=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1651=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1651=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1651=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1651=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1651=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1651=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1651=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1651=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1651=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1651=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1651=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1651=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1651=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1651=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1651=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1651=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1651=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1651=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1651=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1651=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1651=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1651=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * ucode-intel-20250512-150200.56.1 * Basesystem Module 15-SP6 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Manager Proxy 4.3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Manager Server 4.3 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Enterprise Storage 7.1 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * ucode-intel-20250512-150200.56.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * ucode-intel-20250512-150200.56.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-43420.html * https://www.suse.com/security/cve/CVE-2024-45332.html * https://www.suse.com/security/cve/CVE-2025-20012.html * https://www.suse.com/security/cve/CVE-2025-20054.html * https://www.suse.com/security/cve/CVE-2025-20103.html * https://www.suse.com/security/cve/CVE-2025-20623.html * https://www.suse.com/security/cve/CVE-2025-24495.html * https://bugzilla.suse.com/show_bug.cgi?id=1243123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 23 08:30:30 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 23 May 2025 08:30:30 -0000 Subject: SUSE-RU-2025:01685-1: moderate: Recommended update for sysstat Message-ID: <174798903015.21669.9682160716112949184@smelt2.prg2.suse.org> # Recommended update for sysstat Announcement ID: SUSE-RU-2025:01685-1 Release Date: 2025-05-23T06:05:34Z Rating: moderate References: * bsc#1239297 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for sysstat fixes the following issues: * Removed cron dependency in favour of systemd timers (bsc#1239297) * Removed sysstat.cron.suse ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1685=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1685=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1685=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1685=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1685=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1685=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1685=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1685=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1685=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1685=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1685=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1685=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1685=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1685=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1685=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1685=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1685=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1685=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1685=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1685=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1685=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1685=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1685=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1685=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1685=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1685=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Manager Proxy 4.3 (x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239297 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 23 12:30:14 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 23 May 2025 12:30:14 -0000 Subject: SUSE-RU-2025:01691-1: moderate: Recommended update for hwinfo Message-ID: <174800341432.21953.18246988552202696081@smelt2.prg2.suse.org> # Recommended update for hwinfo Announcement ID: SUSE-RU-2025:01691-1 Release Date: 2025-05-23T11:07:53Z Rating: moderate References: * bsc#1240648 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for hwinfo fixes the following issues: * Version update v21.88 * Fix network card detection on aarch64 (bsc#1240648). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1691=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1691=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1691=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1691=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1691=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1691=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1691=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1691=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1691=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1691=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1691=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1691=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 * SUSE Manager Proxy 4.3 (x86_64) * hwinfo-devel-21.88-150400.3.18.1 * hwinfo-debugsource-21.88-150400.3.18.1 * hwinfo-devel-debuginfo-21.88-150400.3.18.1 * hwinfo-debuginfo-21.88-150400.3.18.1 * hwinfo-21.88-150400.3.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240648 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 23 16:30:03 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 23 May 2025 16:30:03 -0000 Subject: SUSE-RU-2025:01699-1: moderate: Recommended update for iotop Message-ID: <174801780335.15399.1787213426217864239@smelt2.prg2.suse.org> # Recommended update for iotop Announcement ID: SUSE-RU-2025:01699-1 Release Date: 2025-05-23T15:44:33Z Rating: moderate References: * bsc#1241104 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for iotop fixes the following issue: * Detect the kernel.task_delayacct sysctl value (bsc#1241104). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1699=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1699=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1699=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1699=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1699=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1699=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1699=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1699=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1699=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1699=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1699=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1699=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1699=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1699=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1699=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1699=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1699=1 ## Package List: * openSUSE Leap 15.6 (noarch) * iotop-0.6-150000.4.7.3 * Basesystem Module 15-SP6 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Manager Proxy 4.3 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Manager Server 4.3 (noarch) * iotop-0.6-150000.4.7.3 * SUSE Enterprise Storage 7.1 (noarch) * iotop-0.6-150000.4.7.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241104 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 23 16:30:06 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 23 May 2025 16:30:06 -0000 Subject: SUSE-RU-2025:01698-1: moderate: Recommended update for wsmancli Message-ID: <174801780637.15399.7946549174703896619@smelt2.prg2.suse.org> # Recommended update for wsmancli Announcement ID: SUSE-RU-2025:01698-1 Release Date: 2025-05-23T13:31:49Z Rating: moderate References: * bsc#1237243 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for wsmancli fixes the following issue: * Fix connecting with TLS (bsc#1237243). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1698=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1698=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1698=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1698=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1698=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1698=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1698=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1698=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1698=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1698=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1698=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1698=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1698=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1698=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1698=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1698=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Manager Proxy 4.3 (x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237243 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 28 12:30:13 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 May 2025 12:30:13 -0000 Subject: SUSE-SU-2025:01724-1: important: Security update for webkit2gtk3 Message-ID: <174843541354.5286.1554291459022429404@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:01724-1 Release Date: 2025-05-28T11:10:48Z Rating: important References: * bsc#1241158 * bsc#1241160 * bsc#1243282 * bsc#1243286 * bsc#1243288 * bsc#1243289 * bsc#1243424 * bsc#1243596 Cross-References: * CVE-2023-42875 * CVE-2023-42970 * CVE-2025-24223 * CVE-2025-31204 * CVE-2025-31205 * CVE-2025-31206 * CVE-2025-31215 * CVE-2025-31257 CVSS scores: * CVE-2023-42875 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-42875 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-42875 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-42970 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-42970 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42970 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24223 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24223 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24223 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31204 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31204 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31205 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-31205 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-31206 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31206 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-31215 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31215 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31257 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-31257 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-31257 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.48.2. Security issues fixed: * CVE-2025-31205: lack of checks may lead to cross-origin data exfiltration through a malicious website (bsc#1243282). * CVE-2025-31204: improper memory handling when processing certain web content may lead to memory corruption (bsc#1243286). * CVE-2025-31206: type confusion issue when processing certain web content may lead to an unexpected crash (bsc#1243288). * CVE-2025-31215: lack of checks when processing certain web content may lead to an unexpected crash (bsc#1243289). * CVE-2025-31257: improper memory handling when processing certain web content may lead to an unexpected crash (bsc#1243596). * CVE-2025-24223: improper memory handling when processing certain web content may lead to memory corruption (bsc#1243424). Other changes and issues fixed: * Enable CSS overscroll behavior by default. * Change threaded rendering implementation to use Skia API instead of WebCore display list that is not thread safe. * Fix rendering when device scale factor change comes before the web view geometry update. * Fix network process crash on exit. * Fix the build with ENABLE_RESOURCE_USAGE=OFF. * Fix several crashes and rendering issues. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1724=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1724=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1724=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1724=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1724=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1724=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1724=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1724=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1724=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1724=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1724=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1724=1 ## Package List: * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * webkitgtk-6_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * webkit-jsc-4-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit-jsc-4.1-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * webkit2gtk3-minibrowser-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-minibrowser-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk4-devel-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk4-minibrowser-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-6_0-2.48.2-150400.4.119.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.2-150400.4.119.1 * webkit-jsc-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit-jsc-4.1-2.48.2-150400.4.119.1 * webkit2gtk4-minibrowser-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-minibrowser-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit-6_0-2.48.2-150400.4.119.1 * webkit-jsc-6.0-debuginfo-2.48.2-150400.4.119.1 * webkit-jsc-6.0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * openSUSE Leap 15.4 (x86_64) * libwebkit2gtk-4_0-37-32bit-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-32bit-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-32bit-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-32bit-2.48.2-150400.4.119.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-64bit-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-64bit-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-64bit-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-64bit-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-6.0-lang-2.48.2-150400.4.119.1 * WebKitGTK-4.1-lang-2.48.2-150400.4.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libwebkit2gtk-4_1-0-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk-4_1-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_1-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_1-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * webkitgtk-6_0-injected-bundles-2.48.2-150400.4.119.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.2-150400.4.119.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-debugsource-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-debuginfo-2.48.2-150400.4.119.1 * libwebkitgtk-6_0-4-2.48.2-150400.4.119.1 * webkit2gtk4-debugsource-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-2.48.2-150400.4.119.1 * webkit2gtk3-devel-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.2-150400.4.119.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150400.4.119.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-devel-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-2.48.2-150400.4.119.1 * webkit2gtk3-soup2-debugsource-2.48.2-150400.4.119.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150400.4.119.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150400.4.119.1 * typelib-1_0-WebKit2-4_0-2.48.2-150400.4.119.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42875.html * https://www.suse.com/security/cve/CVE-2023-42970.html * https://www.suse.com/security/cve/CVE-2025-24223.html * https://www.suse.com/security/cve/CVE-2025-31204.html * https://www.suse.com/security/cve/CVE-2025-31205.html * https://www.suse.com/security/cve/CVE-2025-31206.html * https://www.suse.com/security/cve/CVE-2025-31215.html * https://www.suse.com/security/cve/CVE-2025-31257.html * https://bugzilla.suse.com/show_bug.cgi?id=1241158 * https://bugzilla.suse.com/show_bug.cgi?id=1241160 * https://bugzilla.suse.com/show_bug.cgi?id=1243282 * https://bugzilla.suse.com/show_bug.cgi?id=1243286 * https://bugzilla.suse.com/show_bug.cgi?id=1243288 * https://bugzilla.suse.com/show_bug.cgi?id=1243289 * https://bugzilla.suse.com/show_bug.cgi?id=1243424 * https://bugzilla.suse.com/show_bug.cgi?id=1243596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 28 12:30:25 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 May 2025 12:30:25 -0000 Subject: SUSE-RU-2025:01721-1: moderate: Recommended update for hwdata Message-ID: <174843542574.5286.1719053946549380387@smelt2.prg2.suse.org> # Recommended update for hwdata Announcement ID: SUSE-RU-2025:01721-1 Release Date: 2025-05-27T16:00:51Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that can now be installed. ## Description: This update for hwdata fixes the following issue: * Version update 0.394: * Update pci, usb and vendor ids * Fix usb.ids encoding and a couple of typos * Fix configure to honor --prefix ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1721=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1721=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1721=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1721=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1721=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1721=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1721=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1721=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1721=1 * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1721=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1721=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1721=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1721=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1721=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1721=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1721=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1721=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1721=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1721=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1721=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1721=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1721=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1721=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1721=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1721=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1721=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1721=1 ## Package List: * openSUSE Leap 15.6 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Client Tools for SLE 15 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro 5.3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro 5.4 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * hwdata-0.394-150000.3.77.2 * Basesystem Module 15-SP6 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Proxy 4.3 Module (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Server 4.3 Module (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Proxy 4.3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Manager Server 4.3 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Enterprise Storage 7.1 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro 5.2 (noarch) * hwdata-0.394-150000.3.77.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * hwdata-0.394-150000.3.77.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 28 16:30:03 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 May 2025 16:30:03 -0000 Subject: SUSE-SU-2025:01732-1: important: Security update for python-tornado Message-ID: <174844980399.5223.15252419645217868830@smelt2.prg2.suse.org> # Security update for python-tornado Announcement ID: SUSE-SU-2025:01732-1 Release Date: 2025-05-28T14:44:52Z Rating: important References: * bsc#1243268 Cross-References: * CVE-2025-47287 CVSS scores: * CVE-2025-47287 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47287 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47287 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado fixes the following issues: * CVE-2025-47287: excessive logging when parsing malformed `multipart/form- data` can lead to a denial-of-service (bsc#1243268). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1732=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * python3-tornado-4.2.1-17.10.1 * python-tornado-debuginfo-4.2.1-17.10.1 * python-tornado-debugsource-4.2.1-17.10.1 * python-tornado-4.2.1-17.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47287.html * https://bugzilla.suse.com/show_bug.cgi?id=1243268 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 28 16:30:22 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 May 2025 16:30:22 -0000 Subject: SUSE-SU-2025:01726-1: important: Security update for python-tornado Message-ID: <174844982293.5223.7684735257515916762@smelt2.prg2.suse.org> # Security update for python-tornado Announcement ID: SUSE-SU-2025:01726-1 Release Date: 2025-05-28T13:46:19Z Rating: important References: * bsc#1243268 Cross-References: * CVE-2025-47287 CVSS scores: * CVE-2025-47287 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47287 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47287 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado fixes the following issues: * CVE-2025-47287: excessive logging when parsing malformed `multipart/form- data` can lead to a denial-of-service (bsc#1243268). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1726=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1726=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1726=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1726=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1726=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1726=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1726=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1726=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1726=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1726=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1726=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1726=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1726=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1726=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1726=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1726=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1726=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1726=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1726=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1726=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Manager Proxy 4.3 (x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47287.html * https://bugzilla.suse.com/show_bug.cgi?id=1243268 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 28 16:30:25 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 28 May 2025 16:30:25 -0000 Subject: SUSE-SU-2025:01725-1: important: Security update for gstreamer-plugins-bad Message-ID: <174844982598.5223.6949523601041573131@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2025:01725-1 Release Date: 2025-05-28T13:44:14Z Rating: important References: * bsc#1242809 Cross-References: * CVE-2025-3887 CVSS scores: * CVE-2025-3887 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-3887 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-3887 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * CVE-2025-3887: Fixed possible RCE vulnerability via buffer overflow in H265 Codec Parsing (bsc#1242809). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1725=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1725=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1725=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1725=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1725=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1725=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1725=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1725=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgstadaptivedemux-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-1.20.1-150400.3.26.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.26.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libgstadaptivedemux-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-1.20.1-150400.3.26.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.26.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgstadaptivedemux-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-1.20.1-150400.3.26.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.26.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.26.1 * SUSE Manager Proxy 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libgstadaptivedemux-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstTranscoder-1_0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-1.20.1-150400.3.26.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * libgsttranscoder-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstVulkanXCB-1_0-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-1.20.1-150400.3.26.1 * gstreamer-transcoder-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.26.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstVulkanWayland-1_0-1.20.1-150400.3.26.1 * gstreamer-transcoder-devel-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstVulkan-1_0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-1.20.1-150400.3.26.1 * gstreamer-transcoder-debuginfo-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.26.1 * openSUSE Leap 15.4 (x86_64) * libgsturidownloader-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstva-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-32bit-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-32bit-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-32bit-1.20.1-150400.3.26.1 * libgstva-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-32bit-debuginfo-1.20.1-150400.3.26.1 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.26.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgstwebrtc-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-64bit-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-64bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstplay-1_0-0-64bit-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstva-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstplay-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-64bit-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-64bit-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-64bit-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-64bit-debuginfo-1.20.1-150400.3.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgstadaptivedemux-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-1.20.1-150400.3.26.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.26.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.26.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstsctp-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.26.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-1.20.1-150400.3.26.1 * libgstvulkan-1_0-0-1.20.1-150400.3.26.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.26.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.26.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstwayland-1_0-0-1.20.1-150400.3.26.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.26.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.26.1 * libgstisoff-1_0-0-1.20.1-150400.3.26.1 * libgstplayer-1_0-0-1.20.1-150400.3.26.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.26.1 * libgstva-1_0-0-1.20.1-150400.3.26.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.26.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3887.html * https://bugzilla.suse.com/show_bug.cgi?id=1242809 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 29 16:31:25 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 29 May 2025 16:31:25 -0000 Subject: SUSE-SU-2025:01745-1: important: Security update for dnsdist Message-ID: <174853628528.5267.5142395895746749879@smelt2.prg2.suse.org> # Security update for dnsdist Announcement ID: SUSE-SU-2025:01745-1 Release Date: 2025-05-29T12:22:10Z Rating: important References: * bsc#1243378 Cross-References: * CVE-2025-30193 CVSS scores: * CVE-2025-30193 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30193 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30193 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for dnsdist fixes the following issues: * CVE-2025-30193: stack exhaustion when processing too many queries on incoming TCP connections leads to a denial-of-service (bsc#1243378). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1745=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1745=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1745=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1745=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1745=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1745=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1745=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1745=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1745=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1745=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1745=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1745=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1745=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1745=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Manager Server 4.3 (x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * dnsdist-debuginfo-1.8.0-150400.9.6.1 * dnsdist-1.8.0-150400.9.6.1 * dnsdist-debugsource-1.8.0-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30193.html * https://bugzilla.suse.com/show_bug.cgi?id=1243378 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 30 16:30:06 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 30 May 2025 16:30:06 -0000 Subject: SUSE-SU-2025:01783-1: moderate: Security update for postgresql17 Message-ID: <174862260661.15837.3371627964914377657@smelt2.prg2.suse.org> # Security update for postgresql17 Announcement ID: SUSE-SU-2025:01783-1 Release Date: 2025-05-30T15:37:59Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql17 fixes the following issues: Upgrade to 17.5: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) Changelog: https://www.postgresql.org/docs/release/17.5/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1783=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1783=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1783=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1783=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1783=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1783=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1783=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1783=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1783=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1783=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1783=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1783=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1783=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1783=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1783=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql17-pltcl-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * postgresql17-plperl-debuginfo-17.5-150200.5.13.1 * postgresql17-devel-debuginfo-17.5-150200.5.13.1 * postgresql17-server-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * postgresql17-server-17.5-150200.5.13.1 * postgresql17-pltcl-debuginfo-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-server-devel-debuginfo-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * postgresql17-contrib-17.5-150200.5.13.1 * postgresql17-plpython-debuginfo-17.5-150200.5.13.1 * postgresql17-plperl-17.5-150200.5.13.1 * postgresql17-devel-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * postgresql17-17.5-150200.5.13.1 * postgresql17-contrib-debuginfo-17.5-150200.5.13.1 * postgresql17-plpython-17.5-150200.5.13.1 * postgresql17-server-devel-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql17-docs-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql17-pltcl-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * postgresql17-plperl-debuginfo-17.5-150200.5.13.1 * postgresql17-devel-debuginfo-17.5-150200.5.13.1 * postgresql17-server-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * postgresql17-server-17.5-150200.5.13.1 * postgresql17-pltcl-debuginfo-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-server-devel-debuginfo-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * postgresql17-contrib-17.5-150200.5.13.1 * postgresql17-plpython-debuginfo-17.5-150200.5.13.1 * postgresql17-plperl-17.5-150200.5.13.1 * postgresql17-devel-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * postgresql17-17.5-150200.5.13.1 * postgresql17-contrib-debuginfo-17.5-150200.5.13.1 * postgresql17-plpython-17.5-150200.5.13.1 * postgresql17-server-devel-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql17-docs-17.5-150200.5.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql17-pltcl-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * postgresql17-plperl-debuginfo-17.5-150200.5.13.1 * postgresql17-devel-debuginfo-17.5-150200.5.13.1 * postgresql17-server-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * postgresql17-server-17.5-150200.5.13.1 * postgresql17-pltcl-debuginfo-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-server-devel-debuginfo-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * postgresql17-contrib-17.5-150200.5.13.1 * postgresql17-plpython-debuginfo-17.5-150200.5.13.1 * postgresql17-plperl-17.5-150200.5.13.1 * postgresql17-devel-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * postgresql17-17.5-150200.5.13.1 * postgresql17-contrib-debuginfo-17.5-150200.5.13.1 * postgresql17-plpython-17.5-150200.5.13.1 * postgresql17-server-devel-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql17-docs-17.5-150200.5.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql17-pltcl-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * postgresql17-plperl-debuginfo-17.5-150200.5.13.1 * postgresql17-devel-debuginfo-17.5-150200.5.13.1 * postgresql17-server-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * postgresql17-server-17.5-150200.5.13.1 * postgresql17-pltcl-debuginfo-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-server-devel-debuginfo-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * postgresql17-contrib-17.5-150200.5.13.1 * postgresql17-plpython-debuginfo-17.5-150200.5.13.1 * postgresql17-plperl-17.5-150200.5.13.1 * postgresql17-devel-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * postgresql17-17.5-150200.5.13.1 * postgresql17-contrib-debuginfo-17.5-150200.5.13.1 * postgresql17-plpython-17.5-150200.5.13.1 * postgresql17-server-devel-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql17-docs-17.5-150200.5.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Manager Proxy 4.3 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libpq5-17.5-150200.5.13.1 * libecpg6-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 * SUSE Manager Server 4.3 (s390x) * postgresql17-contrib-debuginfo-17.5-150200.5.13.1 * postgresql17-17.5-150200.5.13.1 * postgresql17-contrib-17.5-150200.5.13.1 * postgresql17-plpython-debuginfo-17.5-150200.5.13.1 * postgresql17-pltcl-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * postgresql17-server-debuginfo-17.5-150200.5.13.1 * postgresql17-plpython-17.5-150200.5.13.1 * postgresql17-server-17.5-150200.5.13.1 * postgresql17-plperl-17.5-150200.5.13.1 * postgresql17-pltcl-debuginfo-17.5-150200.5.13.1 * postgresql17-devel-17.5-150200.5.13.1 * postgresql17-server-devel-17.5-150200.5.13.1 * postgresql17-server-devel-debuginfo-17.5-150200.5.13.1 * postgresql17-plperl-debuginfo-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * postgresql17-devel-debuginfo-17.5-150200.5.13.1 * SUSE Manager Server 4.3 (noarch) * postgresql17-docs-17.5-150200.5.13.1 * SUSE Manager Server 4.3 (x86_64) * libpq5-32bit-debuginfo-17.5-150200.5.13.1 * libpq5-32bit-17.5-150200.5.13.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libecpg6-debuginfo-17.5-150200.5.13.1 * postgresql17-debuginfo-17.5-150200.5.13.1 * libecpg6-17.5-150200.5.13.1 * libpq5-17.5-150200.5.13.1 * postgresql17-debugsource-17.5-150200.5.13.1 * libpq5-debuginfo-17.5-150200.5.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 30 16:30:09 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 30 May 2025 16:30:09 -0000 Subject: SUSE-SU-2025:01782-1: moderate: Security update for postgresql16 Message-ID: <174862260945.15837.12636074527294759978@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2025:01782-1 Release Date: 2025-05-30T15:33:46Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgrade to 16.9: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) Changelog: https://www.postgresql.org/docs/release/16.9/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1782=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1782=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1782=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1782=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1782=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1782=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1782=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1782=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1782=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1782=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1782=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1782=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1782=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1782=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1782=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Manager Server 4.3 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql16-pltcl-16.9-150200.5.29.1 * postgresql16-plpython-16.9-150200.5.29.1 * postgresql16-pltcl-debuginfo-16.9-150200.5.29.1 * postgresql16-16.9-150200.5.29.1 * postgresql16-server-devel-16.9-150200.5.29.1 * postgresql16-server-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 * postgresql16-server-16.9-150200.5.29.1 * postgresql16-contrib-debuginfo-16.9-150200.5.29.1 * postgresql16-plperl-debuginfo-16.9-150200.5.29.1 * postgresql16-server-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-debuginfo-16.9-150200.5.29.1 * postgresql16-devel-16.9-150200.5.29.1 * postgresql16-contrib-16.9-150200.5.29.1 * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-plpython-debuginfo-16.9-150200.5.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql16-docs-16.9-150200.5.29.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-debuginfo-16.9-150200.5.29.1 * postgresql16-debugsource-16.9-150200.5.29.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 30 20:30:11 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 30 May 2025 20:30:11 -0000 Subject: SUSE-SU-2025:01786-1: moderate: Security update for postgresql14 Message-ID: <174863701116.30190.13889655533290728807@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2025:01786-1 Release Date: 2025-05-30T16:12:31Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgrade to 14.18: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1786=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1786=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1786=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1786=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1786=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1786=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1786=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1786=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1786=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1786=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-llvmjit-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-llvmjit-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-llvmjit-devel-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-llvmjit-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-llvmjit-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-llvmjit-devel-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Manager Server 4.3 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql14-docs-14.18-150200.5.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-debuginfo-14.18-150200.5.58.1 * postgresql14-14.18-150200.5.58.1 * postgresql14-pltcl-14.18-150200.5.58.1 * postgresql14-contrib-debuginfo-14.18-150200.5.58.1 * postgresql14-plpython-14.18-150200.5.58.1 * postgresql14-server-devel-14.18-150200.5.58.1 * postgresql14-devel-14.18-150200.5.58.1 * postgresql14-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-pltcl-debuginfo-14.18-150200.5.58.1 * postgresql14-plperl-debuginfo-14.18-150200.5.58.1 * postgresql14-server-14.18-150200.5.58.1 * postgresql14-server-debuginfo-14.18-150200.5.58.1 * postgresql14-server-devel-debuginfo-14.18-150200.5.58.1 * postgresql14-contrib-14.18-150200.5.58.1 * postgresql14-debugsource-14.18-150200.5.58.1 * postgresql14-plperl-14.18-150200.5.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql14-docs-14.18-150200.5.58.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 30 20:30:13 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 30 May 2025 20:30:13 -0000 Subject: SUSE-SU-2025:01785-1: moderate: Security update for postgresql15 Message-ID: <174863701385.30190.4742590757441317959@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2025:01785-1 Release Date: 2025-05-30T16:11:28Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgrade to 15.13: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) Changelog: https://www.postgresql.org/docs/release/15.13/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1785=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1785=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1785=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1785=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1785=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1785=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1785=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1785=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1785=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1785=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1785=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1785=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1785=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1785=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1785=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Manager Server 4.3 (noarch) * postgresql15-docs-15.13-150200.5.41.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql15-debuginfo-15.13-150200.5.41.1 * postgresql15-devel-15.13-150200.5.41.1 * postgresql15-plpython-debuginfo-15.13-150200.5.41.1 * postgresql15-server-15.13-150200.5.41.1 * postgresql15-server-debuginfo-15.13-150200.5.41.1 * postgresql15-contrib-debuginfo-15.13-150200.5.41.1 * postgresql15-plpython-15.13-150200.5.41.1 * postgresql15-devel-debuginfo-15.13-150200.5.41.1 * postgresql15-plperl-debuginfo-15.13-150200.5.41.1 * postgresql15-server-devel-15.13-150200.5.41.1 * postgresql15-contrib-15.13-150200.5.41.1 * postgresql15-pltcl-debuginfo-15.13-150200.5.41.1 * postgresql15-debugsource-15.13-150200.5.41.1 * postgresql15-plperl-15.13-150200.5.41.1 * postgresql15-15.13-150200.5.41.1 * postgresql15-pltcl-15.13-150200.5.41.1 * postgresql15-server-devel-debuginfo-15.13-150200.5.41.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql15-docs-15.13-150200.5.41.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 30 20:30:18 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 30 May 2025 20:30:18 -0000 Subject: SUSE-SU-2025:01784-1: important: Security update for glibc Message-ID: <174863701848.30190.3368680133411930466@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:01784-1 Release Date: 2025-05-30T16:10:21Z Rating: important References: * bsc#1234128 * bsc#1243317 Cross-References: * CVE-2025-4802 CVSS scores: * CVE-2025-4802 ( SUSE ): 9.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-4802 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4802 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for glibc fixes the following issues: Security issues fixed: * CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen search for libraries to load in LD_LIBRARY_PATH (bsc#1243317). Other issues fixed: * Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait` as a consequence of a bug related to stealing of signals (bsc#1234128). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1784=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1784=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1784=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1784=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1784=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1784=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1784=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1784=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1784=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1784=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1784=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1784=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1784=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1784=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1784=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1784=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1784=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1784=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1784=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1784=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1784=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1784=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1784=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1784=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 i686) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * openSUSE Leap 15.3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-html-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * openSUSE Leap 15.3 (x86_64) * glibc-utils-32bit-debuginfo-2.31-150300.95.1 * glibc-profile-32bit-2.31-150300.95.1 * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-utils-32bit-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-devel-static-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * openSUSE Leap 15.3 (aarch64_ilp32) * glibc-64bit-2.31-150300.95.1 * glibc-devel-64bit-debuginfo-2.31-150300.95.1 * glibc-utils-64bit-debuginfo-2.31-150300.95.1 * glibc-64bit-debuginfo-2.31-150300.95.1 * glibc-profile-64bit-2.31-150300.95.1 * glibc-locale-base-64bit-debuginfo-2.31-150300.95.1 * glibc-devel-static-64bit-2.31-150300.95.1 * glibc-locale-base-64bit-2.31-150300.95.1 * glibc-utils-64bit-2.31-150300.95.1 * glibc-devel-64bit-2.31-150300.95.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Manager Proxy 4.3 (x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Manager Proxy 4.3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Manager Server 4.3 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Manager Server 4.3 (x86_64) * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * glibc-devel-debuginfo-2.31-150300.95.1 * glibc-extra-2.31-150300.95.1 * glibc-utils-src-debugsource-2.31-150300.95.1 * glibc-utils-2.31-150300.95.1 * glibc-devel-static-2.31-150300.95.1 * nscd-2.31-150300.95.1 * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-extra-debuginfo-2.31-150300.95.1 * glibc-utils-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * nscd-debuginfo-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * glibc-profile-2.31-150300.95.1 * SUSE Enterprise Storage 7.1 (noarch) * glibc-i18ndata-2.31-150300.95.1 * glibc-lang-2.31-150300.95.1 * glibc-info-2.31-150300.95.1 * SUSE Enterprise Storage 7.1 (x86_64) * glibc-devel-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-debuginfo-2.31-150300.95.1 * glibc-devel-32bit-2.31-150300.95.1 * glibc-32bit-2.31-150300.95.1 * glibc-32bit-debuginfo-2.31-150300.95.1 * glibc-locale-base-32bit-2.31-150300.95.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * glibc-locale-2.31-150300.95.1 * glibc-devel-2.31-150300.95.1 * glibc-debuginfo-2.31-150300.95.1 * glibc-locale-base-2.31-150300.95.1 * glibc-locale-base-debuginfo-2.31-150300.95.1 * glibc-2.31-150300.95.1 * glibc-debugsource-2.31-150300.95.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4802.html * https://bugzilla.suse.com/show_bug.cgi?id=1234128 * https://bugzilla.suse.com/show_bug.cgi?id=1243317 -------------- next part -------------- An HTML attachment was scrubbed... URL: