From null at suse.de Mon Nov 3 08:30:16 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 03 Nov 2025 08:30:16 -0000 Subject: SUSE-SU-2025:3910-1: important: Security update for poppler Message-ID: <176215861632.14862.14799933421978257957@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:3910-1 Release Date: 2025-11-02T12:18:24Z Rating: important References: * bsc#1250908 * bsc#1251940 Cross-References: * CVE-2025-43718 * CVE-2025-52885 CVSS scores: * CVE-2025-43718 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-43718 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-43718 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43718 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-52885 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-52885 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-52885 ( NVD ): 6.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-43718: fixed uncontrolled recursion in the regex-based metadata parser when processing specially crafted PDF files (bsc#1250908) * CVE-2025-52885: improved pointer handling that could have led to dangling pointers when the vector is resized (bsc#1251940) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3910=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3910=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3910=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3910=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3910=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3910=1 ## Package List: * SUSE Manager Proxy 4.3 LTS (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43718.html * https://www.suse.com/security/cve/CVE-2025-52885.html * https://bugzilla.suse.com/show_bug.cgi?id=1250908 * https://bugzilla.suse.com/show_bug.cgi?id=1251940 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 08:30:21 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 03 Nov 2025 08:30:21 -0000 Subject: SUSE-SU-2025:3909-1: important: Security update for xorg-x11-server Message-ID: <176215862148.14862.10307787191832543451@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:3909-1 Release Date: 2025-11-02T12:16:51Z Rating: important References: * bsc#1251958 * bsc#1251959 * bsc#1251960 Cross-References: * CVE-2025-62229 * CVE-2025-62230 * CVE-2025-62231 CVSS scores: * CVE-2025-62229 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62229 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62229 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-62230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62230 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62230 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-62231 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62231 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62231 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves three vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958) * Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959) * Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3909=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3909=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3909=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3909=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3909=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3909=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3909=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3909=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-source-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62229.html * https://www.suse.com/security/cve/CVE-2025-62230.html * https://www.suse.com/security/cve/CVE-2025-62231.html * https://bugzilla.suse.com/show_bug.cgi?id=1251958 * https://bugzilla.suse.com/show_bug.cgi?id=1251959 * https://bugzilla.suse.com/show_bug.cgi?id=1251960 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 16:30:07 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 03 Nov 2025 16:30:07 -0000 Subject: SUSE-RU-2025:3924-1: moderate: Recommended update for pesign-obs-integration Message-ID: <176218740767.29913.15929244241762888862@smelt2.prg2.suse.org> # Recommended update for pesign-obs-integration Announcement ID: SUSE-RU-2025:3924-1 Release Date: 2025-11-03T14:27:48Z Rating: moderate References: * bsc#1248618 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for pesign-obs-integration fixes the following issues: * Fixed that pesign-obs-integration fails build when no signed binary is produced (bsc#1248618) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3924=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3924=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3924=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3924=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3924=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3924=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3924=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3924=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3924=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3924=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3924=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3924=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pesign-obs-integration-10.2+git20210804.ff18da1-150400.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1248618 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 12:30:47 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 04 Nov 2025 12:30:47 -0000 Subject: SUSE-RU-2025:3930-1: moderate: Recommended update for gcc15 Message-ID: <176225944742.15633.14403887249283337737@smelt2.prg2.suse.org> # Recommended update for gcc15 Announcement ID: SUSE-RU-2025:3930-1 Release Date: 2025-11-04T08:28:16Z Rating: moderate References: * bsc#1232526 * bsc#1238491 * bsc#1239566 * bsc#1239938 * bsc#1240788 * bsc#1243794 * bsc#1243991 * bsc#1244050 * jsc#PED-12029 * jsc#PED-253 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP7 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that contains two features and has eight fixes can now be installed. ## Description: This update for gcc15 fixes the following issues: This update ships the GNU Compiler Collection GCC 15.2. (jsc#PED-12029) The compiler runtime libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 14 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP6 and SP7, and provided in the "Development Tools" module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc15 compilers use: * install "gcc15" or "gcc15-c++" or one of the other "gcc15-COMPILER" frontend packages. * override your Makefile to use CC=gcc15, CXX=g++15 and similar overrides for the other languages. For a full changelog with all new GCC15 features, check out https://gcc.gnu.org/gcc-15/changes.html Update to GCC 15.2 release: * the GCC 15.2 release contains regression fixes accumulated since the GCC 15.1 release * Prune the use of update-alternatives from openSUSE Factory and SLFO. * Adjust crosses to conflict consistently where they did not already and make them use unsuffixed binaries. * Tune for power10 for SLES 16. [jsc#PED-12029] * Tune for z15 for SLES 16. [jsc#PED-253] * Fix PR120827, ICE due to splitter emitting constant loads directly * Exclude shared objects present for link editing in the GCC specific subdirectory from provides processing via __provides_exclude_from. [bsc#1244050][bsc#1243991] * Make cross- _-gcc15-bootstrap package conflict with the non-bootstrap variant conflict with the unversioned cross-_ -gcc package. * Enable C++ for offload compilers. [bsc#1243794] * Add libgcobol and libquadmath-devel dependence to the cobol frontend package. Update to GCC 15 branch head, 15.1.1+git9595 * includes GCC 15.1 release * Enable gfx9-generic, gfx10-3-generic and gfx11-generic multilibs for the AMD GCN offload compiler when llvm is new enough. * Make sure link editing is done against our own shared library copy rather than the installed system runtime. [bsc#1240788] * Fix newlib libm miscompilation for GCN offloading. Update to GCC trunk head, 15.0.1+git9001 * includes -msplit-patch-nops required for user-space livepatching on powerpc * includes fix for Ada build with --enable-host-pie * Build GCC executables PIE on SLE. [bsc#1239938] * Includes change to also record -D_FORTIFY_SOURCE=2 in the DWARF debug info DW_AT_producer string. [bsc#1239566] * Package GCC COBOL compiler for openSUSE Factory for supported targets which are x86_64, aarch64 and ppc64le. * Disable profiling during build when %want_reproducible_builds is set [bsc#1238491] * Includes fix for emacs JIT use * Bumps libgo SONAME to libgo24 which should fix go1.9 build * Adjust cross compiler requirements to use %requires_ge * For cross compilers require the same or newer binutils, newlib or cross- glibc that was used at build time. [bsc#1232526] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3930=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2025-3930=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3930=1 SUSE-SLE- INSTALLER-15-SP4-2025-3930=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-3930=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-3930=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-3930=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3930=1 SUSE-SLE- INSTALLER-15-SP5-2025-3930=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-3930=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-3930=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-3930=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-3930=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-3930=1 * SUSE Linux Enterprise Server 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2025-3930=1 * SUSE Linux Enterprise High Performance Computing 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2025-3930=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2025-3930=1 * SUSE Linux Enterprise Desktop 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2025-3930=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3930=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3930=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3930=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3930=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3930=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3930=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3930=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3930=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3930=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3930=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3930=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3930=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3930=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3930=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3930=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3930=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3930=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3930=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3930=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3930=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3930=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3930=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3930=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3930=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3930=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3930=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3930=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cross-avr-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libm2iso20-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libm2log20-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * cross-pru-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2cor20-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-arm-none-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * gcc15-obj-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libada15-15.2.0+git10201-150000.1.3.3 * gcc15-ada-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-m2-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2min20-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-rx-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-hppa-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-avr-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-hppa-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-riscv64-elf-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * gcc15-testresults-15.2.0+git10201-150000.1.3.5 * libm2min20-15.2.0+git10201-150000.1.3.3 * libm2pim20-15.2.0+git10201-150000.1.3.3 * cross-riscv64-elf-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-rx-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * gcc15-m2-15.2.0+git10201-150000.1.3.3 * cross-arm-none-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-hppa-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-arm-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * liblsan0-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * cross-pru-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libgo24-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-arm-none-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-riscv64-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-arm-gcc15-15.2.0+git10201-150000.1.3.2 * libatomic1-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * gcc15-go-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-avr-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * cross-pru-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * gcc15-objc-15.2.0+git10201-150000.1.3.3 * cross-rx-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgo24-15.2.0+git10201-150000.1.3.3 * libm2pim20-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-ada-15.2.0+git10201-150000.1.3.3 * cross-arm-gcc15-debugsource-15.2.0+git10201-150000.1.3.2 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libm2log20-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-riscv64-elf-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-riscv64-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * cross-bpf-gcc15-debugsource-15.2.0+git10201-150000.1.3.2 * gcc15-go-15.2.0+git10201-150000.1.3.3 * libm2cor20-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * gcc15-objc-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cross-bpf-gcc15-15.2.0+git10201-150000.1.3.2 * cross-bpf-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * cpp15-15.2.0+git10201-150000.1.3.3 * cross-riscv64-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * libada15-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2iso20-debuginfo-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-aarch64-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-aarch64-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * openSUSE Leap 15.6 (x86_64) * cross-nvptx-gcc15-debugsource-15.2.0+git10201-150000.1.3.2 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.3.2 * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.3.2 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * cross-ppc64-gcc15-debugsource-15.2.0+git10201-150000.1.3.2 * cross-ppc64le-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-ppc64-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * libgphobos6-15.2.0+git10201-150000.1.3.3 * libgdruntime6-15.2.0+git10201-150000.1.3.3 * gcc15-d-15.2.0+git10201-150000.1.3.3 * libgdruntime6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-debuginfo-15.2.0+git10201-150000.1.3.3 * cross-ppc64le-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * cross-ppc64-gcc15-15.2.0+git10201-150000.1.3.2 * cross-ppc64le-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * libgphobos6-debuginfo-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.3.2 * cross-s390x-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-s390x-gcc15-bootstrap-15.2.0+git10201-150000.1.3.2 * openSUSE Leap 15.6 (s390x x86_64) * libm2cor20-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-objc-32bit-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-go-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libada15-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-ada-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-m2-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-15.2.0+git10201-150000.1.3.3 * libada15-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2cor20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-gcc15-debugsource-15.2.0+git10201-150000.1.3.2 * cross-x86_64-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-x86_64-gcc15-15.2.0+git10201-150000.1.3.2 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Manager Proxy 4.3 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP6 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP7 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP7 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 (ppc64le x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Desktop 15 SP7 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libatomic1-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libatomic1-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libatomic1-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libatomic1-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libatomic1-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP6 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP6 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP6 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP7 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP7 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * Basesystem Module 15-SP7 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP6 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP6 (ppc64le x86_64) * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP6 (x86_64) * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.3.2 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.3.2 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP7 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP7 (ppc64le x86_64) * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * Development Tools Module 15-SP7 (x86_64) * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.3.2 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.3.2 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.3.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libm2iso20-15.2.0+git10201-150000.1.3.3 * libgo24-15.2.0+git10201-150000.1.3.3 * libgo24-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2log20-15.2.0+git10201-150000.1.3.3 * libm2pim20-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-ada-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-15.2.0+git10201-150000.1.3.3 * libm2log20-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2cor20-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2min20-15.2.0+git10201-150000.1.3.3 * libm2pim20-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-go-15.2.0+git10201-150000.1.3.3 * libm2cor20-15.2.0+git10201-150000.1.3.3 * gcc15-m2-15.2.0+git10201-150000.1.3.3 * gcc15-go-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-objc-debuginfo-15.2.0+git10201-150000.1.3.3 * libada15-15.2.0+git10201-150000.1.3.3 * gcc15-objc-15.2.0+git10201-150000.1.3.3 * libada15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-ada-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-m2-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2min20-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2iso20-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Package Hub 15 15-SP6 (aarch64 s390x x86_64) * libgphobos6-15.2.0+git10201-150000.1.3.3 * gcc15-d-15.2.0+git10201-150000.1.3.3 * libgdruntime6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-15.2.0+git10201-150000.1.3.3 * libgphobos6-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Package Hub 15 15-SP6 (x86_64) * libm2cor20-32bit-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-objc-32bit-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-go-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libada15-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-ada-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-m2-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-15.2.0+git10201-150000.1.3.3 * libada15-32bit-15.2.0+git10201-150000.1.3.3 * libm2cor20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libm2iso20-15.2.0+git10201-150000.1.3.3 * libgo24-15.2.0+git10201-150000.1.3.3 * libgo24-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2log20-15.2.0+git10201-150000.1.3.3 * libm2pim20-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-ada-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-15.2.0+git10201-150000.1.3.3 * libm2log20-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2cor20-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2min20-15.2.0+git10201-150000.1.3.3 * libm2pim20-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-go-15.2.0+git10201-150000.1.3.3 * libm2cor20-15.2.0+git10201-150000.1.3.3 * gcc15-m2-15.2.0+git10201-150000.1.3.3 * gcc15-go-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-objc-debuginfo-15.2.0+git10201-150000.1.3.3 * libada15-15.2.0+git10201-150000.1.3.3 * gcc15-objc-15.2.0+git10201-150000.1.3.3 * libada15-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-ada-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-m2-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2min20-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2iso20-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Package Hub 15 15-SP7 (aarch64 s390x x86_64) * libgphobos6-15.2.0+git10201-150000.1.3.3 * gcc15-d-15.2.0+git10201-150000.1.3.3 * libgdruntime6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-15.2.0+git10201-150000.1.3.3 * libgphobos6-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Package Hub 15 15-SP7 (x86_64) * libm2cor20-32bit-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-objc-32bit-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgphobos6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-go-32bit-15.2.0+git10201-150000.1.3.3 * libgo24-32bit-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libada15-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-15.2.0+git10201-150000.1.3.3 * libm2pim20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgdruntime6-32bit-15.2.0+git10201-150000.1.3.3 * libm2log20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-obj-c++-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-ada-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-d-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-m2-32bit-15.2.0+git10201-150000.1.3.3 * libm2iso20-32bit-15.2.0+git10201-150000.1.3.3 * libm2min20-32bit-15.2.0+git10201-150000.1.3.3 * libada15-32bit-15.2.0+git10201-150000.1.3.3 * libm2cor20-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * libstdc++6-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64) * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-locale-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gcc15-info-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Manager Proxy 4.3 LTS (x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * SUSE Manager Server 4.3 LTS (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * liblsan0-15.2.0+git10201-150000.1.3.3 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * gcc15-c++-15.2.0+git10201-150000.1.3.3 * libatomic1-debuginfo-15.2.0+git10201-150000.1.3.3 * liblsan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-15.2.0+git10201-150000.1.3.3 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.3.3 * libobjc4-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-15.2.0+git10201-150000.1.3.3 * libasan8-15.2.0+git10201-150000.1.3.3 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * libtsan2-15.2.0+git10201-150000.1.3.3 * libitm1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.3.3 * libasan8-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libhwasan0-15.2.0+git10201-150000.1.3.3 * libatomic1-15.2.0+git10201-150000.1.3.3 * libtsan2-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-PIE-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libubsan1-15.2.0+git10201-150000.1.3.3 * cpp15-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-debuginfo-15.2.0+git10201-150000.1.3.3 * libstdc++6-locale-15.2.0+git10201-150000.1.3.3 * libitm1-15.2.0+git10201-150000.1.3.3 * cpp15-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * gcc15-15.2.0+git10201-150000.1.3.3 * libobjc4-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Enterprise Storage 7.1 (x86_64) * libgfortran5-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-15.2.0+git10201-150000.1.3.3 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-15.2.0+git10201-150000.1.3.3 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.3.3 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.3.3 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-c++-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.3.3 * libatomic1-32bit-15.2.0+git10201-150000.1.3.3 * gcc15-32bit-15.2.0+git10201-150000.1.3.3 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libubsan1-32bit-15.2.0+git10201-150000.1.3.3 * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.3.3 * libgomp1-32bit-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libstdc++6-debuginfo-15.2.0+git10201-150000.1.3.3 * gcc15-debugsource-15.2.0+git10201-150000.1.3.3 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.3.3 * libgcc_s1-15.2.0+git10201-150000.1.3.3 * libstdc++6-15.2.0+git10201-150000.1.3.3 * gcc15-debuginfo-15.2.0+git10201-150000.1.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232526 * https://bugzilla.suse.com/show_bug.cgi?id=1238491 * https://bugzilla.suse.com/show_bug.cgi?id=1239566 * https://bugzilla.suse.com/show_bug.cgi?id=1239938 * https://bugzilla.suse.com/show_bug.cgi?id=1240788 * https://bugzilla.suse.com/show_bug.cgi?id=1243794 * https://bugzilla.suse.com/show_bug.cgi?id=1243991 * https://bugzilla.suse.com/show_bug.cgi?id=1244050 * https://jira.suse.com/browse/PED-12029 * https://jira.suse.com/browse/PED-253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 08:30:07 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 05 Nov 2025 08:30:07 -0000 Subject: SUSE-SU-2025:3941-1: important: Security update for tiff Message-ID: <176233140717.3980.7278010503118627413@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:3941-1 Release Date: 2025-11-05T07:16:02Z Rating: important References: * bsc#1250413 Cross-References: * CVE-2025-9900 CVSS scores: * CVE-2025-9900 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9900 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9900 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2025-9900: Fixed Write-What-Where in libtiff via TIFFReadRGBAImageOriented (bsc#1250413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3941=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3941=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3941=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3941=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3941=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3941=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3941=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3941=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3941=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3941=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3941=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3941=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3941=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP6 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP7 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libtiff5-32bit-4.0.9-150000.45.60.1 * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libtiff5-32bit-4.0.9-150000.45.60.1 * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Server 4.3 LTS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Enterprise Storage 7.1 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9900.html * https://bugzilla.suse.com/show_bug.cgi?id=1250413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:23 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 05 Nov 2025 12:30:23 -0000 Subject: SUSE-RU-2025:3948-1: moderate: Recommended update for jitterentropy Message-ID: <176234582399.10768.18219410174644290198@smelt2.prg2.suse.org> # Recommended update for jitterentropy Announcement ID: SUSE-RU-2025:3948-1 Release Date: 2025-11-05T08:30:57Z Rating: moderate References: * bsc#1209627 Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for jitterentropy fixes the following issues: * Fixed a stack corruption on s390x: [bsc#1209627] * Output size of the STCKE command on s390x is 16 bytes, compared to 8 bytes of the STCK command. Fix a stack corruption in the s390x version of jent_get_nstime(). Add some more detailed information on the STCKE command. Updated to 3.4.1 * add FIPS 140 hints to man page * simplify the test tool to search for optimal configurations * fix: jent_loop_shuffle: re-add setting the time that was lost with 3.4.0 * enhancement: add ARM64 assembler code to read high-res timer ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3948=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3948=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3948=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3948=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-3948=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-3948=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-3948=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * SUSE Manager Proxy 4.3 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * jitterentropy-devel-static-3.4.1-150000.1.12.1 * jitterentropy-debugsource-3.4.1-150000.1.12.1 * libjitterentropy3-3.4.1-150000.1.12.1 * jitterentropy-devel-3.4.1-150000.1.12.1 * libjitterentropy3-debuginfo-3.4.1-150000.1.12.1 * SUSE Manager Server 4.3 (x86_64) * libjitterentropy3-32bit-debuginfo-3.4.1-150000.1.12.1 * libjitterentropy3-32bit-3.4.1-150000.1.12.1 * jitterentropy-devel-32bit-3.4.1-150000.1.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:31:01 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 05 Nov 2025 12:31:01 -0000 Subject: SUSE-SU-2025:3942-1: moderate: Security update for qatengine, qatlib Message-ID: <176234586141.10768.8295321771161569191@smelt2.prg2.suse.org> # Security update for qatengine, qatlib Announcement ID: SUSE-SU-2025:3942-1 Release Date: 2025-11-05T08:16:03Z Rating: moderate References: * bsc#1233363 * bsc#1233365 * bsc#1233366 Cross-References: * CVE-2024-28885 * CVE-2024-31074 * CVE-2024-33617 CVSS scores: * CVE-2024-28885 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28885 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves three vulnerabilities can now be installed. ## Description: This update for qatengine, qatlib fixes the following issues: Note that the 1.6.1 release included in 1.7.0 fixes the following vulnerabilities: * bsc#1233363 (CVE-2024-28885) * bsc#1233365 (CVE-2024-31074) * bsc#1233366 (CVE-2024-33617) Update to 1.7.0: * ipp-crypto name change to cryptography-primitives * QAT_SW GCM memory leak fix in cleanup function * Update limitation section in README for v1.7.0 release * Fix build with OPENSSL_NO_ENGINE * Fix for build issues with qatprovider in qatlib * Bug fixes and README updates to v1.7.0 * Remove qat_contig_mem driver support * Add support for building QAT Engine ENGINE and PROVIDER modules with QuicTLS 3.x libraries * Fix for DSA issue with openssl3.2 * Fix missing lower bounds check on index i * Enabled SW Fallback support for FBSD * Fix for segfault issue when SHIM config section is unavailable * Fix for Coverity & Resource leak * Fix for RSA failure with SVM enabled in openssl-3.2 * SM3 Memory Leak Issue Fix * Fix qatprovider lib name issue with system openssl Update to 1.6.0: * Fix issue with make depend for QAT_SW * QAT_HW GCM Memleak fix & bug fixes * QAT2.0 FreeBSD14 intree driver support * Fix OpenSSL 3.2 compatibility issues * Optimize hex dump logging * Clear job tlv on error * QAT_HW RSA Encrypt and Decrypt provider support * QAT_HW AES-CCM Provider support * Add ECDH keymgmt support for provider * Fix QAT_HW SM2 memory leak * Enable qaeMemFreeNonZeroNUMA() for qatlib * Fix polling issue for the process that doesn't have QAT_HW instance * Fix SHA3 qctx initialization issue & potential memleak * Fix compilation error in SM2 with qat_contig_mem * Update year in copyright information to 2024 Update to 1.5.0: * use new --enable-qat_insecure_algorithms to avoid regressions * improve support for SM{2,3,4} ciphers * improve SW fallback support * many bug fixes, refactorisations and documentation updates * update to 0.6.18: * Fix address sanitizer issues * Fix issues with Babassl & Openssl3.0 * Add QAT_HW SM4 CBC support * Refactor ECX provider code into single file * Fix QAT_HW AES-GCM bad mac record & memleak * Fix SHA3 memory leak * Fix sm4-cbc build error with system default OpenSSL * Symmetric performance Optimization & memleak fixes * Bug fix, README & v0.6.18 Version update * Please refer README (Software requirements section) for dependent libraries release version and other information. * update to v0.6.17: * Add security policy - c1a7a96 * Add dependancy update tool file - 522c41d * Release v0.6.17 version update - c1a7a96 * Enable QAT_SW RSA & ECDSA support for BoringSSL - 1035e82 * Fix QAT_SW SM2 ECDSA Performance issue - f44a564 * CPP check and Makefile Bug fixes - 98ccbe8 * Fix buffer overflow issue with SHA3 and ECX - cab65f3 * Update version and README for v0.6.16 - 1c95fd7 * Split --with-qat_sw_install_dir into seperate configures - d5f5656 * Add seperate err files for Boringssl - 1a09627 * Fix QAT_HW & QAT_SW AES-GCM issue with s_server in provider - c775f5c * Fix issue with disable flags in provider - 2e00636 * Fix coredump issue in provider with qat_sw gcm - 6703c13 * Fix err files regeneration failure - 510f3dc * Add Provider Support for ChachaPoly and SM2 - a98e51d * Bug Fixes in testapp and with disable flags. - 0945535 * QAT HW&SW Co-existence dynamic mechanism support. - 5baf5aa * Fix issue with SIGUSR1 during reload. - 00ea833 * Refactor qat_hw instances based on Sym/Asym capabilities. - bb10128 * Replace deprecated pthread_yield with sched_yield. - d514406 * BoringSSL support for RSA and ECDSA. - 41c67c7 * Fix s_server lseek forever issue with qatprovider. - cb3db21 * Fix aes-cbc failure issue in testapp. - a530427 * Fix glibc version test - 2461966 * Fix issue with generator param and ECDSA verify. - c51fc17 * Provider Support for DSA, DH, HKDF, PRF, SHA3 & aes-cbc - 7cc5eb9 * Fix testapp issues and optimization - e7c2ba8 * Optimize setup and clear async event notification - 573fe48 * Fix Nginx worker process core dump in QAT_SW with pkill/killall - 4eb4473 * Add Cofactor to take optimized path in ECDH API - 9a23c7e * Fix double free issue with QAT_SW - 1a16708 * Add thread mapping to specific QAT_HW instance - 5ee799a * OpenSSL 3.0 Provider Support - 38086fa * Update README and version to v0.6.12 - dca2957 * Fixed worker process hung forever after nginx reload - bfe97aa * Remove OpenSSL 1.1.0 Support - da8682a * Add QAT_SW SM2 ECDH & SM3 support - 04a6af2 * QAT_SW ECDSA SM2 sign and verify Support - d44ae7e * Disable SM3, Bug fixes, Readme & version update - d995046 qatlib was updated to: Update to 24.09.0: * Improved performance scaling in multi-thread applications * Set core affinity mapping based on NUMA (libnuma now required for building) * bug fixes, see https://github.com/intel/qatlib#resolved-issues Version update to 24.02.0 * Support DC NS (NoSession) APIs * Support Symmetric Crypto SM3 & SM4 * Support Asymmetric Crypto SM2 * Support DC CompressBound APIs * Bug Fixes. See Resolved section in README.md Update to 23.11.0: * use new --enable-legacy-algorithms to avoid regressions * add support for data compression chaining (hash then compress) * add support for additional configuration profiles * add support DC NS (NoSession) APIs * add support DC CompressBound APIs * add Support for Chinese SM{2,3,4} ciphers * bump shared library major to 4 * refactoring, bug fixes and documentation updates Update to 22.07.2: * Changed from yasm to nasm for assembly compilation * Added configuration option to use C implementation of soft CRC implementation instead of asm * Added support for pkg-config * Added missing lock around accesses to some global data in qatmgr * Fix for QATE-86605 ? improve error checking on size param used by qatmgr debug function. * Fix for issue #10 * Fixed link to Programmer's Guide * Added support for Compression LZ4 and LZ4s algorithms * Added support for Compression end-to-end integrity checks * Added support for PKE Generic Point Multiply APIs * Added support for CPM2.0b * Updated library to support new version of QAT APIs * Updated qat service to allow compression only and crypto only configurations * Created qatlib-tests rpm package * Added option to configure script to skip building sample code ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3942=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3942=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3942=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3942=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3942=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3942=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3942=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3942=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Server 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28885.html * https://www.suse.com/security/cve/CVE-2024-31074.html * https://www.suse.com/security/cve/CVE-2024-33617.html * https://bugzilla.suse.com/show_bug.cgi?id=1233363 * https://bugzilla.suse.com/show_bug.cgi?id=1233365 * https://bugzilla.suse.com/show_bug.cgi?id=1233366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 20:30:08 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 06 Nov 2025 20:30:08 -0000 Subject: SUSE-RU-2025:3981-1: moderate: Recommended update for inotify-tools Message-ID: <176246100846.13604.2462976681507347624@smelt2.prg2.suse.org> # Recommended update for inotify-tools Announcement ID: SUSE-RU-2025:3981-1 Release Date: 2025-11-06T18:15:35Z Rating: moderate References: * bsc#1249617 * jsc#SLE-21025 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that contains one feature and has one fix can now be installed. ## Description: This update for inotify-tools fixes the following issues: * Bug fix on garbled output (bsc#1249617). * Static code analysis annotations and fixes. * New maintainer. * python3-pyinotify rpm has a limited version of notify operation, including inotify-tools (jsc#SLE-21025). * Build noarch package for doc only for newer suse version. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3981=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3981=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3981=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3981=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3981=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3981=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3981=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3981=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3981=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3981=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3981=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3981=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3981=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3981=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3981=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * openSUSE Leap 15.4 (noarch) * inotify-tools-doc-3.21.9.6-150400.3.3.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * openSUSE Leap 15.6 (noarch) * inotify-tools-doc-3.21.9.6-150400.3.3.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Manager Proxy 4.3 LTS (x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * inotify-tools-devel-3.21.9.6-150400.3.3.3 * libinotifytools0-3.21.9.6-150400.3.3.3 * libinotifytools0-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-3.21.9.6-150400.3.3.3 * inotify-tools-debuginfo-3.21.9.6-150400.3.3.3 * inotify-tools-debugsource-3.21.9.6-150400.3.3.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1249617 * https://jira.suse.com/browse/SLE-21025 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 20:30:13 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 06 Nov 2025 20:30:13 -0000 Subject: SUSE-RU-2025:3979-1: moderate: Recommended update for man-pages-posix Message-ID: <176246101312.13604.18022799993309092918@smelt2.prg2.suse.org> # Recommended update for man-pages-posix Announcement ID: SUSE-RU-2025:3979-1 Release Date: 2025-11-06T17:06:08Z Rating: moderate References: * bsc#1252161 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for man-pages-posix fixes the following issue: * Use %license tag in the description (bsc#1252161). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3979=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3979=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3979=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3979=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3979=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3979=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3979=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3979=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3979=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3979=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3979=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3979=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3979=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3979=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3979=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3979=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3979=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3979=1 ## Package List: * openSUSE Leap 15.6 (noarch) * man-pages-posix-2013a-150000.3.6.2 * Basesystem Module 15-SP6 (noarch) * man-pages-posix-2013a-150000.3.6.2 * Basesystem Module 15-SP7 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Manager Proxy 4.3 LTS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Manager Server 4.3 LTS (noarch) * man-pages-posix-2013a-150000.3.6.2 * SUSE Enterprise Storage 7.1 (noarch) * man-pages-posix-2013a-150000.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:16 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 07 Nov 2025 16:30:16 -0000 Subject: SUSE-SU-2025:3997-1: important: Security update for java-17-openjdk Message-ID: <176253301620.13748.16921025192332045398@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2025:3997-1 Release Date: 2025-11-07T15:51:02Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Upgrade to upstream tag jdk-17.0.17+10 (October 2025 CPU): * CVE-2025-53057: Fixed unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414). * CVE-2025-53066: Fixed unauthenticated attacker can achive unauthorized access to critical data or complete access (bsc#1252417). Other bug fixes: * Do not embed rebuild counter (bsc#1246806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3997=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3997=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3997=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3997=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3997=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3997=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3997=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3997=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3997=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3997=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3997=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3997=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3997=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-src-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-jmods-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.4 (noarch) * java-17-openjdk-javadoc-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-src-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-jmods-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.6 (noarch) * java-17-openjdk-javadoc-17.0.17.0-150400.3.60.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:20 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 07 Nov 2025 16:30:20 -0000 Subject: SUSE-SU-2025:3996-1: important: Security update for java-11-openjdk Message-ID: <176253302072.13748.13060476521321234649@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:3996-1 Release Date: 2025-11-07T15:49:28Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.29+7 (October 2025 CPU): * CVE-2025-53057: Fixed unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414). * CVE-2025-53066: Fixed unauthenticated attacker can achive unauthorized access to critical data or complete access (bsc#1252417). Other bug fixes: * Do not embed rebuild counter (bsc#1246806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3996=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3996=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3996=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3996=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3996=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3996=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3996=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3996=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3996=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-src-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-jmods-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * openSUSE Leap 15.6 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Package Hub 15 15-SP6 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * SUSE Package Hub 15 15-SP7 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:23 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 07 Nov 2025 16:30:23 -0000 Subject: SUSE-RU-2025:3994-1: moderate: Recommended update for opie Message-ID: <176253302330.13748.11817490732722539335@smelt2.prg2.suse.org> # Recommended update for opie Announcement ID: SUSE-RU-2025:3994-1 Release Date: 2025-11-07T15:03:19Z Rating: moderate References: * bsc#1252168 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for opie fixes the following issue: * Properly fix package license and copyright (bsc#1252168). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3994=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3994=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3994=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3994=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3994=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3994=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3994=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3994=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3994=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3994=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3994=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3994=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3994=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3994=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3994=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3994=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3994=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3994=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Manager Server 4.3 LTS (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * SUSE Enterprise Storage 7.1 (x86_64) * opie-debugsource-2.4-150000.3.3.2 * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * opie-2.4-150000.3.3.2 * opie-debugsource-2.4-150000.3.3.2 * opie-debuginfo-2.4-150000.3.3.2 * openSUSE Leap 15.6 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * Basesystem Module 15-SP6 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 * Basesystem Module 15-SP7 (x86_64) * opie-32bit-debuginfo-2.4-150000.3.3.2 * opie-32bit-2.4-150000.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252168 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:35 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 07 Nov 2025 16:30:35 -0000 Subject: SUSE-RU-2025:3990-1: moderate: Recommended update for mirror Message-ID: <176253303510.13748.14557037030020276362@smelt2.prg2.suse.org> # Recommended update for mirror Announcement ID: SUSE-RU-2025:3990-1 Release Date: 2025-11-07T15:02:15Z Rating: moderate References: * bsc#1252164 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for mirror fixes the following issue: * Fix the %licence tag for the package (bsc#1252164). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3990=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3990=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3990=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3990=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3990=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3990=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3990=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3990=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3990=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3990=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3990=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3990=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3990=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3990=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3990=1 ## Package List: * openSUSE Leap 15.6 (noarch) * mirror-2.9-150000.3.9.2 * Server Applications Module 15-SP6 (noarch) * mirror-2.9-150000.3.9.2 * Server Applications Module 15-SP7 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * mirror-2.9-150000.3.9.2 * SUSE Manager Proxy 4.3 LTS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Manager Server 4.3 LTS (noarch) * mirror-2.9-150000.3.9.2 * SUSE Enterprise Storage 7.1 (noarch) * mirror-2.9-150000.3.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252164 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:31:09 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 12 Nov 2025 12:31:09 -0000 Subject: SUSE-SU-2025:20992-1: important: Security update 5.1.1 of SUSE Multi-Linux Manager Message-ID: <176295066934.13655.17303373235593051813@smelt2.prg2.suse.org> # Security update 5.1.1 of SUSE Multi-Linux Manager Announcement ID: SUSE-SU-2025:20992-1 Release Date: 2025-10-17T08:47:21Z Rating: important References: * bsc#1229825 * bsc#1241880 * bsc#1243331 * bsc#1243486 * bsc#1243611 * bsc#1243704 * bsc#1244027 * bsc#1244127 * bsc#1244219 * bsc#1244424 * bsc#1244552 * bsc#1244919 * bsc#1245099 * bsc#1245120 * bsc#1245702 * bsc#1246068 * bsc#1246320 * bsc#1246553 * bsc#1246789 * bsc#1246882 * bsc#1246906 * bsc#1247688 * bsc#1247836 * bsc#1248252 * bsc#1249434 * jsc#MSQA-1023 Cross-References: * CVE-2025-53192 CVSS scores: * CVE-2025-53192 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-53192 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L * CVE-2025-53192 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Multi-Linux Manager Proxy 5.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 * SUSE Multi-Linux Manager Server 5.1 An update that solves one vulnerability, contains one feature and has 24 fixes can now be installed. ## Description: This update for SUSE Multi-Linux Manager fixes the following issues: proxy-helm was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Chart rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use traefik.io API group (bsc#1244919) proxy-httpd-image was updated fromv version 5.1.8 to 5.1.10: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies * Version 5.1.9 * Use absolute paths when invoking external commands * Handle large static files outside of wsgi script (bsc#1244424) * Reorganize proxy apache configuration * remove unused access to pub dir * move cobbler configs from the uyuni-config to the proxy package * add max workers limit to 150 (bsc#1244552) * use proxypass instead of wsgi to pass API calls to the server and anonymous dirs (bsc#1241880) * Use existing systemid in proxy httpd if present (bsc#1246789) proxy-salt-broker-image was updated from version 5.1.8 to 5.1.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands proxy-squid-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands proxy-tftpd-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands * Do not block the main tftpd process (bsc#1244424) * Fix selecting of default saltboot entry in grub server-attestation-image was updated from version 5.1.7 to 5.1.10: * CVE-2025-53192: Do not use apache-commons-ognl but its successor ognl (bsc#1248252) * Image rebuilt to the newest version with updated dependencies server-hub-xmlrpc-api-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies server-image was updated from version 5.1.7 to 5.1.9:: * Version 5.1.9 * Install python311-ldap into the server-image (bsc#1245702) * Version 5.1.8 * Move jmx configuration to a persisting folder (bsc#1244219) server-migration-14-16-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies server-postgresql-image was updated from version 5.1.5 to 5.1.7: * Image rebuilt to the newest version with updated dependencies server-saline-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies uyuni-tools was updated from version 5.1.18-0 to 5.1.22-0: * Version 5.1.22-0 * Fix cobbler config migration to standalone files * Fix generated DB certificate subject alternate names * Version 5.1.21-0 * Remove extraneous quotes when getting the running image (bsc#1249434) * Version 5.1.20-0 * Add migration for server monitoring configuration (bsc#1247688) * Version 5.1.19-0 * Add a lowercase version of --logLevel (bsc#1243611) * Stop executing scripts in temporary folder (bsc#1243704) * support config: collect podman inspect for hub container (bsc#1245099) * Use new dedicated path for Cobbler settings (bsc#1244027) * Migrate custom auto installation snippets (bsc#1246320) * Add SUSE Linux Enterprise 15 SP7 to buildin productmap * Fix loading product map from mgradm configuration file (bsc#1246068) * Fix channel override for distro copy * Do not use sudo when running as a root user (bsc#1246882) * Do not require backups to be at the same location for restoring (bsc#1246906) * Fix recomputing proxy images when installing a PTF or TEST (bsc#1246553) * Add mgradm server rename to change the server FQDN (bsc#1229825) * If no DB SSL CA parameter is given, use the other one (bsc#1245120) * More fault tolerant mgradm stop (bsc#1243331) * Backup systemd dropin directory too and create if missing * Add 3rd party SSL options for upgrade and migration scenarios * Do not consider stderr output of podman as an error (bsc#1247836) * Restore SELinux contexts for restored backup volumes (bsc#1244127) * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789) * Bump the default image tag to 5.1.1 How to apply this update: SUSE Multi-Linux Manager Server: 1. Log in as root user to the SUSE Multi-Linux Manager Server. 2. Upgrade mgradm and mgrctl. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgradm upgrade podman` which will use the default image tags. SUSE Multi-Linux Manager Proxy / Retail Branch Server: 1. Log in as root user to the SUSE Multi-Linux Manager Proxy / Retail Branch Server. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Proxy 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 * SUSE Multi-Linux Manager Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 ## Package List: * SUSE Multi-Linux Manager Proxy 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-5.1.22-slfo.1.1.1 * mgrpxy-debuginfo-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (noarch) * mgrpxy-zsh-completion-5.1.22-slfo.1.1.1 * mgrpxy-bash-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Proxy 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1-9.5.33 * SUSE Multi-Linux Manager Proxy 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Proxy 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1-8.7.18 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-5.1.22-slfo.1.1.1 * mgrpxy-debuginfo-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (noarch) * mgrpxy-zsh-completion-5.1.22-slfo.1.1.1 * mgrpxy-bash-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1-9.5.33 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1-8.7.18 * SUSE Multi-Linux Manager Server 5.1 (aarch64 ppc64le s390x x86_64) * mgradm-debuginfo-5.1.22-slfo.1.1.1 * mgrctl-debuginfo-5.1.22-slfo.1.1.1 * mgradm-5.1.22-slfo.1.1.1 * mgrctl-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (noarch) * mgradm-bash-completion-5.1.22-slfo.1.1.1 * mgrctl-bash-completion-5.1.22-slfo.1.1.1 * mgrctl-zsh-completion-5.1.22-slfo.1.1.1 * mgradm-zsh-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-aarch64-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-aarch64-server-attestation-image-5.1.1-8.7.8 * suse-multi-linux-manager-5.1-aarch64-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-aarch64-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-aarch64-server-saline-image-5.1.1-9.5.24 * SUSE Multi-Linux Manager Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-ppc64le-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-ppc64le-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-ppc64le-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-ppc64le-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-ppc64le-server-attestation-image-5.1.1-8.7.8 * SUSE Multi-Linux Manager Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-s390x-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-s390x-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-s390x-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-s390x-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-s390x-server-attestation-image-5.1.1-8.7.8 * SUSE Multi-Linux Manager Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-server-attestation-image-5.1.1-8.7.8 * suse-multi-linux-manager-5.1-x86_64-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-x86_64-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-x86_64-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-x86_64-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-x86_64-server-migration-14-16-image-5.1.1-8.5.26 ## References: * https://www.suse.com/security/cve/CVE-2025-53192.html * https://bugzilla.suse.com/show_bug.cgi?id=1229825 * https://bugzilla.suse.com/show_bug.cgi?id=1241880 * https://bugzilla.suse.com/show_bug.cgi?id=1243331 * https://bugzilla.suse.com/show_bug.cgi?id=1243486 * https://bugzilla.suse.com/show_bug.cgi?id=1243611 * https://bugzilla.suse.com/show_bug.cgi?id=1243704 * https://bugzilla.suse.com/show_bug.cgi?id=1244027 * https://bugzilla.suse.com/show_bug.cgi?id=1244127 * https://bugzilla.suse.com/show_bug.cgi?id=1244219 * https://bugzilla.suse.com/show_bug.cgi?id=1244424 * https://bugzilla.suse.com/show_bug.cgi?id=1244552 * https://bugzilla.suse.com/show_bug.cgi?id=1244919 * https://bugzilla.suse.com/show_bug.cgi?id=1245099 * https://bugzilla.suse.com/show_bug.cgi?id=1245120 * https://bugzilla.suse.com/show_bug.cgi?id=1245702 * https://bugzilla.suse.com/show_bug.cgi?id=1246068 * https://bugzilla.suse.com/show_bug.cgi?id=1246320 * https://bugzilla.suse.com/show_bug.cgi?id=1246553 * https://bugzilla.suse.com/show_bug.cgi?id=1246789 * https://bugzilla.suse.com/show_bug.cgi?id=1246882 * https://bugzilla.suse.com/show_bug.cgi?id=1246906 * https://bugzilla.suse.com/show_bug.cgi?id=1247688 * https://bugzilla.suse.com/show_bug.cgi?id=1247836 * https://bugzilla.suse.com/show_bug.cgi?id=1248252 * https://bugzilla.suse.com/show_bug.cgi?id=1249434 * https://jira.suse.com/browse/MSQA-1023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 13 16:30:10 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 13 Nov 2025 16:30:10 -0000 Subject: SUSE-SU-2025:4090-1: critical: Security update for lasso Message-ID: <176305141005.20318.12491873696860359551@smelt2.prg2.suse.org> # Security update for lasso Announcement ID: SUSE-SU-2025:4090-1 Release Date: 2025-11-13T13:03:07Z Rating: critical References: * bsc#1253092 * bsc#1253093 * bsc#1253094 * bsc#1253095 Cross-References: * CVE-2025-46404 * CVE-2025-46705 * CVE-2025-46784 * CVE-2025-47151 CVSS scores: * CVE-2025-46404 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46404 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46404 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46705 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47151 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-47151 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47151 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves four vulnerabilities can now be installed. ## Description: This update for lasso fixes the following issues: * CVE-2025-46784: Fixed memory exhaustion in Entr'ouvert Lasso (bsc#1253094) * CVE-2025-46404: Fixed denial of service in Entr'ouvert Lasso (bsc#1253092) * CVE-2025-46705: Fixed denial of service in Entr'ouvert Lasso (bsc#1253093) * CVE-2025-47151: Fixed type confusion vulnerability in the lasso_node_impl_init_from_xml functionality (bsc#1253095) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4090=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4090=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4090=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4090=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4090=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46404.html * https://www.suse.com/security/cve/CVE-2025-46705.html * https://www.suse.com/security/cve/CVE-2025-46784.html * https://www.suse.com/security/cve/CVE-2025-47151.html * https://bugzilla.suse.com/show_bug.cgi?id=1253092 * https://bugzilla.suse.com/show_bug.cgi?id=1253093 * https://bugzilla.suse.com/show_bug.cgi?id=1253094 * https://bugzilla.suse.com/show_bug.cgi?id=1253095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 13 20:30:04 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 13 Nov 2025 20:30:04 -0000 Subject: SUSE-RU-2025:4093-1: moderate: Recommended update for intel-SINIT Message-ID: <176306580474.20159.12627150642647719751@smelt2.prg2.suse.org> # Recommended update for intel-SINIT Announcement ID: SUSE-RU-2025:4093-1 Release Date: 2025-11-13T18:30:20Z Rating: moderate References: * bsc#1252152 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for intel-SINIT fixes the following issue: * Copy license files into uniquely named files and mark them as licenses for the package (bsc#1252152). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4093=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4093=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4093=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4093=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4093=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4093=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4093=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4093=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4093=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4093=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4093=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4093=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4093=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4093=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4093=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4093=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4093=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4093=1 ## Package List: * openSUSE Leap 15.6 (noarch) * intel-SINIT-2.3-150000.4.5.2 * Basesystem Module 15-SP6 (noarch) * intel-SINIT-2.3-150000.4.5.2 * Basesystem Module 15-SP7 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Manager Proxy 4.3 LTS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Manager Server 4.3 LTS (noarch) * intel-SINIT-2.3-150000.4.5.2 * SUSE Enterprise Storage 7.1 (noarch) * intel-SINIT-2.3-150000.4.5.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252152 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 13 20:30:12 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 13 Nov 2025 20:30:12 -0000 Subject: SUSE-RU-2025:4092-1: moderate: Recommended update for elfutils Message-ID: <176306581227.20159.3623892777408559565@smelt2.prg2.suse.org> # Recommended update for elfutils Announcement ID: SUSE-RU-2025:4092-1 Release Date: 2025-11-13T18:28:51Z Rating: moderate References: * bsc#1237236 * bsc#1237240 * bsc#1237241 * bsc#1237242 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has four fixes can now be installed. ## Description: This update for elfutils fixes the following issues: * Fixing build/testsuite for more recent glibc and kernels. * Fixing denial of service and general buffer overflow errors (bsc#1237236, bsc#1237240, bsc#1237241, bsc#1237242). * Fixing testsuite race conditions in run-debuginfod-find.sh. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4092=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4092=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4092=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4092=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4092=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4092=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4092=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4092=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4092=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4092=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4092=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4092=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4092=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4092=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4092=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4092=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4092=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Manager Proxy 4.3 LTS (x86_64) * libelf1-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * SUSE Manager Proxy 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libelf1-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libelf1-0.185-150400.5.8.3 * libdebuginfod1-dummy-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdebuginfod-dummy-devel-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-dummy-0.185-150400.5.8.3 * debuginfod-dummy-client-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * debuginfod-dummy-client-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * openSUSE Leap 15.4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * openSUSE Leap 15.4 (x86_64) * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libelf-devel-32bit-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * openSUSE Leap 15.4 (aarch64_ilp32) * libdw1-64bit-0.185-150400.5.8.3 * libasm1-64bit-0.185-150400.5.8.3 * libasm1-64bit-debuginfo-0.185-150400.5.8.3 * libelf1-64bit-debuginfo-0.185-150400.5.8.3 * libelf1-64bit-0.185-150400.5.8.3 * libelf-devel-64bit-0.185-150400.5.8.3 * libdw1-64bit-debuginfo-0.185-150400.5.8.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdebuginfod1-dummy-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdebuginfod-dummy-devel-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-dummy-0.185-150400.5.8.3 * debuginfod-dummy-client-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * debuginfod-dummy-client-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * openSUSE Leap 15.6 (noarch) * elfutils-lang-0.185-150400.5.8.3 * openSUSE Leap 15.6 (x86_64) * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libelf-devel-32bit-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (noarch) * elfutils-lang-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (noarch) * elfutils-lang-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libdebuginfod-devel-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * libdw-devel-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237236 * https://bugzilla.suse.com/show_bug.cgi?id=1237240 * https://bugzilla.suse.com/show_bug.cgi?id=1237241 * https://bugzilla.suse.com/show_bug.cgi?id=1237242 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:31:20 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 14 Nov 2025 12:31:20 -0000 Subject: SUSE-SU-2025:4096-1: important: Security update for binutils Message-ID: <176312348033.20318.9701219829218612064@smelt2.prg2.suse.org> # Security update for binutils Announcement ID: SUSE-SU-2025:4096-1 Release Date: 2025-11-14T08:09:02Z Rating: important References: * bsc#1040589 * bsc#1236632 * bsc#1236976 * bsc#1236977 * bsc#1236978 * bsc#1236999 * bsc#1237000 * bsc#1237001 * bsc#1237003 * bsc#1237005 * bsc#1237018 * bsc#1237019 * bsc#1237020 * bsc#1237021 * bsc#1237042 * bsc#1240870 * bsc#1241916 * bsc#1243756 * bsc#1243760 * bsc#1246481 * bsc#1246486 * bsc#1247105 * bsc#1247114 * bsc#1247117 * bsc#1250632 * bsc#1251275 * bsc#1251276 * bsc#1251277 * bsc#1251794 * bsc#1251795 Cross-References: * CVE-2025-0840 * CVE-2025-11083 * CVE-2025-11412 * CVE-2025-11413 * CVE-2025-11414 * CVE-2025-1147 * CVE-2025-1148 * CVE-2025-1149 * CVE-2025-11494 * CVE-2025-11495 * CVE-2025-1150 * CVE-2025-1151 * CVE-2025-1152 * CVE-2025-1153 * CVE-2025-1176 * CVE-2025-1178 * CVE-2025-1179 * CVE-2025-1180 * CVE-2025-1181 * CVE-2025-1182 * CVE-2025-3198 * CVE-2025-5244 * CVE-2025-5245 * CVE-2025-7545 * CVE-2025-7546 * CVE-2025-8224 * CVE-2025-8225 CVSS scores: * CVE-2025-0840 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0840 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-0840 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-11083 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11083 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11083 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11412 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11412 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11412 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11412 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11413 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11413 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11414 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11414 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1147 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1147 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1147 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1147 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1147 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-1148 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1148 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1148 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1149 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1149 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1149 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1149 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11494 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11494 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11494 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1150 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1150 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1151 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1151 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1151 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1151 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1152 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1152 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1152 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1152 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1153 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1153 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1153 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1176 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1176 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1178 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1178 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1178 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1178 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-1179 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1179 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1179 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1179 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1180 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1180 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1180 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1180 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1181 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1181 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1181 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1181 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1182 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1182 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3198 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3198 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5244 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5245 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-5245 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5245 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5245 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5245 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-7545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-7545 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7545 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7546 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-7546 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-7546 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7546 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7546 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8224 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8224 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8224 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8225 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8225 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8225 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8225 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves 27 vulnerabilities and has three security fixes can now be installed. ## Description: This update for binutils fixes the following issues: * Do not enable '-z gcs=implicit' on aarch64 for old codestreams. Update to version 2.45: * New versioned release of libsframe.so.2 * s390: tools now support SFrame format 2; recognize "z17" as CPU name [bsc#1247105, jsc#IBM-1485] * sframe sections are now of ELF section type SHT_GNU_SFRAME. * sframe secions generated by the assembler have SFRAME_F_FDE_FUNC_START_PCREL set. * riscv: Support more extensions: standard: Zicfiss v1.0, Zicfilp v1.0, Zcmp v1.0, Zcmt v1.0, Smrnmi v1.0, S[sm]dbltrp v1.0, S[sm]ctr v1.0, ssqosid v1.0, ssnpm v1.0, smnpm v1.0, smmpm v1.0, sspm v1.0, supm v1.0, sha v1.0, zce v1.0, smcdeleg v1.0, ssccfg v1.0, svvptc v1.0, zilsd v1.0, zclsd v1.0, smrnmi v1.0; vendor: CORE-V, xcvbitmanip v1.0 and xcvsimd v1.0; SiFive, xsfvqmaccdod v1.0, xsfvqmaccqoqv1.0 and xsfvfnrclipxfqf v1.0; T-Head: xtheadvdot v1.0; MIPS: xmipscbop v1.0, xmipscmov v1.0, xmipsexectl v1.0, xmipslsp v1.0. * Support RISC-V privileged version 1.13, profiles 20/22/23, and .bfloat16 directive. * x86: Add support for these ISAs: Intel Diamond Rapids AMX, MOVRS, AVX10.2 (including SM4), MSR_IMM; Zhaoxin PadLock PHE2, RNG2, GMI, XMODX. Drop support for AVX10.2 256 bit rounding. * arm: Add support for most of Armv9.6, enabled by -march=armv9.6-a and extensions '+cmpbr', '+f8f16mm', '+f8f32mm', '+fprcvt', '+lsfe', '+lsui', '+occmo', '+pops', '+sme2p2', '+ssve-aes', '+sve-aes', '+sve-aes2', '+sve- bfscale', '+sve-f16f32mm' and '+sve2p2'. * Predefined symbols "GAS(version)" and, on non-release builds, "GAS(date)" are now being made available. * Add .errif and .warnif directives. * linker: * Add --image-base= option to the ELF linker to behave the same as -Ttext-segment for compatibility with LLD. * Add support for mixed LTO and non-LTO codes in relocatable output. * s390: linker generates .eh_frame and/or .sframe for linker generated .plt sections by default (can be disabled by --no-ld-generated-unwind-info). * riscv: add new PLT formats, and GNU property merge rules for zicfiss and zicfilp extensions. * gold is no longer included * Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1236632 aka CVE-2025-0840 aka PR32650 * bsc#1236977 aka CVE-2025-1149 aka PR32576 * bsc#1236978 aka CVE-2025-1148 aka PR32576 * bsc#1236999 aka CVE-2025-1176 aka PR32636 * bsc#1237000 aka CVE-2025-1153 aka PR32603 * bsc#1237001 aka CVE-2025-1152 aka PR32576 * bsc#1237003 aka CVE-2025-1151 aka PR32576 * bsc#1237005 aka CVE-2025-1150 aka PR32576 * bsc#1237018 aka CVE-2025-1178 aka PR32638 * bsc#1237019 aka CVE-2025-1181 aka PR32643 * bsc#1237020 aka CVE-2025-1180 aka PR32642 * bsc#1237021 aka CVE-2025-1179 aka PR32640 * bsc#1237042 aka CVE-2025-1182 aka PR32644 * bsc#1240870 aka CVE-2025-3198 aka PR32716 * bsc#1243756 aka CVE-2025-5244 aka PR32858 * bsc#1243760 aka CVE-2025-5245 aka PR32829 * bsc#1246481 aka CVE-2025-7545 aka PR33049 * bsc#1246486 aka CVE-2025-7546 aka PR33050 * bsc#1247114 aka CVE-2025-8224 aka PR32109 * bsc#1247117 aka CVE-2025-8225 no PR * Add these backport patches: * bsc#1236976 aka CVE-2025-1147 aka PR32556 * bsc#1250632 aka CVE-2025-11083 aka PR33457 * bsc#1251275 aka CVE-2025-11412 aka PR33452 * bsc#1251276 aka CVE-2025-11413 aka PR33456 * bsc#1251277 aka CVE-2025-11414 aka PR33450 * bsc#1251794 aka CVE-2025-11494 aka PR33499 * bsc#1251795 aka CVE-2025-11495 aka PR33502 * Skip PGO with %want_reproducible_builds (bsc#1040589) * Fix crash in assembler with -gdwarf-5 * aarch64-common-pagesize.patch, aarch64 no longer uses 64K page size * Add -std=gnu17 to move gcc15 forward, as temporary measure until the binutils version can be updated [bsc#1241916]. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4096=1 openSUSE-SLE-15.6-2025-4096=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4096=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4096=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4096=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4096=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4096=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4096=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4096=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4096=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4096=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4096=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perf-debugsource-5.3.18-150300.38.7.1 * perf-5.3.18-150300.38.7.1 * perf-debuginfo-5.3.18-150300.38.7.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * libucm0-1.9.0-150300.4.2.5 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libucs0-1.9.0-150300.4.2.5 * libucm0-debuginfo-1.9.0-150300.4.2.5 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * openucx-debugsource-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * openSUSE Leap 15.3 (aarch64_ilp32) * libucm0-64bit-1.9.0-150300.4.2.5 * libuct0-64bit-debuginfo-1.9.0-150300.4.2.5 * libuct0-64bit-1.9.0-150300.4.2.5 * libucs0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucp0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucp0-64bit-1.9.0-150300.4.2.5 * libucm0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucs0-64bit-1.9.0-150300.4.2.5 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * perf-debugsource-5.14.21-150400.44.20.1 * perf-debuginfo-5.14.21-150400.44.20.1 * perf-devel-5.14.21-150400.44.20.1 * perf-5.14.21-150400.44.20.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libucm0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-1.11.1-150400.4.2.1 * libucp0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libucm0-64bit-debuginfo-1.11.1-150400.4.2.1 * libucm0-64bit-1.11.1-150400.4.2.1 * libucs0-64bit-1.11.1-150400.4.2.1 * libucp0-64bit-1.11.1-150400.4.2.1 * libucs0-64bit-debuginfo-1.11.1-150400.4.2.1 * libucp0-64bit-debuginfo-1.11.1-150400.4.2.1 * libuct0-64bit-debuginfo-1.11.1-150400.4.2.1 * libuct0-64bit-1.11.1-150400.4.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * perf-debuginfo-5.14.21-150500.52.5.1 * perf-debugsource-5.14.21-150500.52.5.1 * perf-devel-5.14.21-150500.52.5.1 * perf-5.14.21-150500.52.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libucs0-debuginfo-1.13.1-150500.4.2.5 * openucx-debugsource-1.13.1-150500.4.2.5 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * libuct0-debuginfo-1.13.1-150500.4.2.5 * openucx-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * perf-gtk-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-gtk-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-bash-completion-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debugsource-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-devel-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cross-avr-binutils-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.15.0-150600.3.5.2 * cross-ppc64-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa-binutils-debugsource-2.45-150100.7.57.1 * cross-mips-binutils-2.45-150100.7.57.1 * cross-sparc-binutils-debugsource-2.45-150100.7.57.1 * cross-avr-binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-debugsource-2.45-150100.7.57.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * cross-i386-binutils-debugsource-2.45-150100.7.57.1 * cross-bpf-binutils-2.45-150100.7.57.1 * cross-rx-binutils-2.45-150100.7.57.1 * cross-epiphany-binutils-debuginfo-2.45-150100.7.57.1 * cross-ppc64-binutils-debugsource-2.45-150100.7.57.1 * libucp0-1.15.0-150600.3.5.2 * cross-i386-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-debuginfo-2.45-150100.7.57.1 * cross-pru-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa64-binutils-debugsource-2.45-150100.7.57.1 * binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc-binutils-2.45-150100.7.57.1 * libucs0-1.15.0-150600.3.5.2 * libucs-devel-1.15.0-150600.3.5.2 * libuct0-1.15.0-150600.3.5.2 * cross-i386-binutils-debuginfo-2.45-150100.7.57.1 * cross-mips-binutils-debugsource-2.45-150100.7.57.1 * cross-ppc-binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-debugsource-2.45-150100.7.57.1 * cross-m68k-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa64-binutils-2.45-150100.7.57.1 * libucm0-debuginfo-1.15.0-150600.3.5.2 * binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-debuginfo-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * cross-riscv64-binutils-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * cross-ppc-binutils-debuginfo-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * cross-hppa-binutils-2.45-150100.7.57.1 * cross-m68k-binutils-debugsource-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct0-debuginfo-1.15.0-150600.3.5.2 * cross-sparc64-binutils-2.45-150100.7.57.1 * cross-ppc-binutils-2.45-150100.7.57.1 * cross-spu-binutils-debugsource-2.45-150100.7.57.1 * cross-ia64-binutils-2.45-150100.7.57.1 * libucs0-debuginfo-1.15.0-150600.3.5.2 * cross-rx-binutils-debugsource-2.45-150100.7.57.1 * libucp0-debuginfo-1.15.0-150600.3.5.2 * cross-hppa-binutils-debuginfo-2.45-150100.7.57.1 * cross-spu-binutils-2.45-150100.7.57.1 * cross-epiphany-binutils-2.45-150100.7.57.1 * cross-rx-binutils-debuginfo-2.45-150100.7.57.1 * cross-epiphany-binutils-debugsource-2.45-150100.7.57.1 * cross-pru-binutils-2.45-150100.7.57.1 * cross-arm-binutils-debuginfo-2.45-150100.7.57.1 * cross-arm-binutils-2.45-150100.7.57.1 * cross-bpf-binutils-debuginfo-2.45-150100.7.57.1 * cross-pru-binutils-debugsource-2.45-150100.7.57.1 * cross-sparc64-binutils-debugsource-2.45-150100.7.57.1 * cross-riscv64-binutils-debuginfo-2.45-150100.7.57.1 * cross-m68k-binutils-2.45-150100.7.57.1 * openucx-debugsource-1.15.0-150600.3.5.2 * libucm0-1.15.0-150600.3.5.2 * libucp-devel-1.15.0-150600.3.5.2 * cross-mips-binutils-debuginfo-2.45-150100.7.57.1 * cross-ppc64-binutils-2.45-150100.7.57.1 * cross-riscv64-binutils-debugsource-2.45-150100.7.57.1 * cross-hppa64-binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc-binutils-debuginfo-2.45-150100.7.57.1 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.15.0-150600.3.5.2 * cross-bpf-binutils-debugsource-2.45-150100.7.57.1 * cross-spu-binutils-debuginfo-2.45-150100.7.57.1 * cross-arm-binutils-debugsource-2.45-150100.7.57.1 * cross-ia64-binutils-debuginfo-2.45-150100.7.57.1 * cross-ia64-binutils-debugsource-2.45-150100.7.57.1 * libuct-devel-1.15.0-150600.3.5.2 * cross-avr-binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc64-binutils-debuginfo-2.45-150100.7.57.1 * openucx-tools-1.15.0-150600.3.5.2 * libucm-devel-1.15.0-150600.3.5.2 * openSUSE Leap 15.6 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-binutils-debuginfo-2.45-150100.7.57.1 * cross-aarch64-binutils-2.45-150100.7.57.1 * cross-aarch64-binutils-debugsource-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * cross-ppc64le-binutils-debugsource-2.45-150100.7.57.1 * cross-ppc64le-binutils-2.45-150100.7.57.1 * cross-ppc64le-binutils-debuginfo-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-binutils-debuginfo-2.45-150100.7.57.1 * cross-s390x-binutils-2.45-150100.7.57.1 * cross-s390x-binutils-debugsource-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-binutils-debuginfo-2.45-150100.7.57.1 * cross-x86_64-binutils-2.45-150100.7.57.1 * cross-x86_64-binutils-debugsource-2.45-150100.7.57.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openucx-tools-debuginfo-1.15.0-150600.3.5.2 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.15.0-150600.3.5.2 * binutils-debuginfo-2.45-150100.7.57.1 * libucs0-1.15.0-150600.3.5.2 * libucs-devel-1.15.0-150600.3.5.2 * libuct0-1.15.0-150600.3.5.2 * libucm0-debuginfo-1.15.0-150600.3.5.2 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct0-debuginfo-1.15.0-150600.3.5.2 * libucs0-debuginfo-1.15.0-150600.3.5.2 * libucp0-debuginfo-1.15.0-150600.3.5.2 * libctf0-debuginfo-2.45-150100.7.57.1 * libucm0-1.15.0-150600.3.5.2 * libucp-devel-1.15.0-150600.3.5.2 * openucx-debugsource-1.15.0-150600.3.5.2 * openucx-debuginfo-1.15.0-150600.3.5.2 * libuct-devel-1.15.0-150600.3.5.2 * openucx-tools-1.15.0-150600.3.5.2 * libucm-devel-1.15.0-150600.3.5.2 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libucm-devel-1.17.0-150700.4.2.7 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.17.0-150700.4.2.7 * libuct0-1.17.0-150700.4.2.7 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.17.0-150700.4.2.7 * openucx-tools-debuginfo-1.17.0-150700.4.2.7 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-1.17.0-150700.4.2.7 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct-devel-1.17.0-150700.4.2.7 * libucp0-1.17.0-150700.4.2.7 * libucs0-1.17.0-150700.4.2.7 * openucx-debugsource-1.17.0-150700.4.2.7 * libucs-devel-1.17.0-150700.4.2.7 * openucx-debuginfo-1.17.0-150700.4.2.7 * libucp-devel-1.17.0-150700.4.2.7 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.17.0-150700.4.2.7 * openucx-tools-1.17.0-150700.4.2.7 * libucs0-debuginfo-1.17.0-150700.4.2.7 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perf-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debugsource-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-devel-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * Development Tools Module 15-SP6 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perf-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-debuginfo-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-debugsource-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-devel-6.4.0.git54263.0aad576b1c-150700.3.2.2 * Development Tools Module 15-SP7 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * binutils-debuginfo-2.45-150100.7.57.1 * binutils-debugsource-2.45-150100.7.57.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * binutils-debuginfo-2.45-150100.7.57.1 * binutils-debugsource-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Enterprise Storage 7.1 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0840.html * https://www.suse.com/security/cve/CVE-2025-11083.html * https://www.suse.com/security/cve/CVE-2025-11412.html * https://www.suse.com/security/cve/CVE-2025-11413.html * https://www.suse.com/security/cve/CVE-2025-11414.html * https://www.suse.com/security/cve/CVE-2025-1147.html * https://www.suse.com/security/cve/CVE-2025-1148.html * https://www.suse.com/security/cve/CVE-2025-1149.html * https://www.suse.com/security/cve/CVE-2025-11494.html * https://www.suse.com/security/cve/CVE-2025-11495.html * https://www.suse.com/security/cve/CVE-2025-1150.html * https://www.suse.com/security/cve/CVE-2025-1151.html * https://www.suse.com/security/cve/CVE-2025-1152.html * https://www.suse.com/security/cve/CVE-2025-1153.html * https://www.suse.com/security/cve/CVE-2025-1176.html * https://www.suse.com/security/cve/CVE-2025-1178.html * https://www.suse.com/security/cve/CVE-2025-1179.html * https://www.suse.com/security/cve/CVE-2025-1180.html * https://www.suse.com/security/cve/CVE-2025-1181.html * https://www.suse.com/security/cve/CVE-2025-1182.html * https://www.suse.com/security/cve/CVE-2025-3198.html * https://www.suse.com/security/cve/CVE-2025-5244.html * https://www.suse.com/security/cve/CVE-2025-5245.html * https://www.suse.com/security/cve/CVE-2025-7545.html * https://www.suse.com/security/cve/CVE-2025-7546.html * https://www.suse.com/security/cve/CVE-2025-8224.html * https://www.suse.com/security/cve/CVE-2025-8225.html * https://bugzilla.suse.com/show_bug.cgi?id=1040589 * https://bugzilla.suse.com/show_bug.cgi?id=1236632 * https://bugzilla.suse.com/show_bug.cgi?id=1236976 * https://bugzilla.suse.com/show_bug.cgi?id=1236977 * https://bugzilla.suse.com/show_bug.cgi?id=1236978 * https://bugzilla.suse.com/show_bug.cgi?id=1236999 * https://bugzilla.suse.com/show_bug.cgi?id=1237000 * https://bugzilla.suse.com/show_bug.cgi?id=1237001 * https://bugzilla.suse.com/show_bug.cgi?id=1237003 * https://bugzilla.suse.com/show_bug.cgi?id=1237005 * https://bugzilla.suse.com/show_bug.cgi?id=1237018 * https://bugzilla.suse.com/show_bug.cgi?id=1237019 * https://bugzilla.suse.com/show_bug.cgi?id=1237020 * https://bugzilla.suse.com/show_bug.cgi?id=1237021 * https://bugzilla.suse.com/show_bug.cgi?id=1237042 * https://bugzilla.suse.com/show_bug.cgi?id=1240870 * https://bugzilla.suse.com/show_bug.cgi?id=1241916 * https://bugzilla.suse.com/show_bug.cgi?id=1243756 * https://bugzilla.suse.com/show_bug.cgi?id=1243760 * https://bugzilla.suse.com/show_bug.cgi?id=1246481 * https://bugzilla.suse.com/show_bug.cgi?id=1246486 * https://bugzilla.suse.com/show_bug.cgi?id=1247105 * https://bugzilla.suse.com/show_bug.cgi?id=1247114 * https://bugzilla.suse.com/show_bug.cgi?id=1247117 * https://bugzilla.suse.com/show_bug.cgi?id=1250632 * https://bugzilla.suse.com/show_bug.cgi?id=1251275 * https://bugzilla.suse.com/show_bug.cgi?id=1251276 * https://bugzilla.suse.com/show_bug.cgi?id=1251277 * https://bugzilla.suse.com/show_bug.cgi?id=1251794 * https://bugzilla.suse.com/show_bug.cgi?id=1251795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 16:30:21 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 14 Nov 2025 16:30:21 -0000 Subject: SUSE-SU-2025:4107-1: important: Security update for bind Message-ID: <176313782127.20308.17467804513743735038@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4107-1 Release Date: 2025-11-14T15:54:31Z Rating: important References: * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4107=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4107=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4107=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4107=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4107=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4107=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4107=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4107=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * openSUSE Leap 15.4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Proxy 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Server 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:30:23 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 17 Nov 2025 08:30:23 -0000 Subject: SUSE-SU-2025:4112-1: moderate: Security update for openssh Message-ID: <176336822324.8181.17982382398536717735@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:4112-1 Release Date: 2025-11-15T22:39:02Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198) * CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4112=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4112=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4112=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4112=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4112=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4112=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4112=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4112=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4112=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-cavs-debuginfo-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-cavs-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:33:10 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 17 Nov 2025 08:33:10 -0000 Subject: SUSE-SU-2025:4111-1: important: Security update for the Linux Kernel Message-ID: <176336839024.8181.10742316439940104869@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4111-1 Release Date: 2025-11-15T18:39:08Z Rating: important References: * bsc#1065729 * bsc#1205128 * bsc#1206893 * bsc#1207612 * bsc#1207619 * bsc#1210763 * bsc#1211162 * bsc#1211692 * bsc#1213098 * bsc#1213114 * bsc#1213747 * bsc#1214954 * bsc#1214992 * bsc#1215148 * bsc#1217366 * bsc#1236104 * bsc#1249479 * bsc#1249608 * bsc#1249857 * bsc#1249859 * bsc#1249988 * bsc#1250742 * bsc#1250816 * bsc#1250946 * bsc#1251027 * bsc#1251032 * bsc#1251034 * bsc#1251035 * bsc#1251040 * bsc#1251043 * bsc#1251045 * bsc#1251047 * bsc#1251052 * bsc#1251057 * bsc#1251059 * bsc#1251061 * bsc#1251063 * bsc#1251064 * bsc#1251065 * bsc#1251066 * bsc#1251068 * bsc#1251072 * bsc#1251080 * bsc#1251082 * bsc#1251086 * bsc#1251087 * bsc#1251088 * bsc#1251091 * bsc#1251092 * bsc#1251093 * bsc#1251097 * bsc#1251099 * bsc#1251101 * bsc#1251104 * bsc#1251110 * bsc#1251113 * bsc#1251115 * bsc#1251123 * bsc#1251128 * bsc#1251129 * bsc#1251133 * bsc#1251136 * bsc#1251147 * bsc#1251149 * bsc#1251154 * bsc#1251159 * bsc#1251164 * bsc#1251166 * bsc#1251169 * bsc#1251170 * bsc#1251173 * bsc#1251178 * bsc#1251180 * bsc#1251182 * bsc#1251197 * bsc#1251200 * bsc#1251201 * bsc#1251202 * bsc#1251208 * bsc#1251210 * bsc#1251215 * bsc#1251218 * bsc#1251222 * bsc#1251223 * bsc#1251230 * bsc#1251247 * bsc#1251268 * bsc#1251281 * bsc#1251282 * bsc#1251283 * bsc#1251285 * bsc#1251286 * bsc#1251292 * bsc#1251294 * bsc#1251295 * bsc#1251296 * bsc#1251298 * bsc#1251299 * bsc#1251300 * bsc#1251302 * bsc#1251303 * bsc#1251306 * bsc#1251310 * bsc#1251312 * bsc#1251322 * bsc#1251324 * bsc#1251325 * bsc#1251326 * bsc#1251327 * bsc#1251329 * bsc#1251330 * bsc#1251331 * bsc#1251519 * bsc#1251521 * bsc#1251522 * bsc#1251527 * bsc#1251529 * bsc#1251550 * bsc#1251723 * bsc#1251725 * bsc#1251728 * bsc#1251730 * bsc#1251736 * bsc#1251737 * bsc#1251741 * bsc#1251743 * bsc#1251750 * bsc#1251753 * bsc#1251759 * bsc#1251761 * bsc#1251762 * bsc#1251763 * bsc#1251764 * bsc#1251767 * bsc#1251769 * bsc#1251772 * bsc#1251775 * bsc#1251777 * bsc#1251785 * bsc#1251823 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252047 * bsc#1252069 * bsc#1252265 * bsc#1252474 * bsc#1252475 * bsc#1252476 * bsc#1252480 * bsc#1252484 * bsc#1252486 * bsc#1252489 * bsc#1252490 * bsc#1252492 * bsc#1252495 * bsc#1252497 * bsc#1252499 * bsc#1252501 * bsc#1252508 * bsc#1252509 * bsc#1252513 * bsc#1252515 * bsc#1252516 * bsc#1252519 * bsc#1252521 * bsc#1252522 * bsc#1252523 * bsc#1252526 * bsc#1252528 * bsc#1252529 * bsc#1252532 * bsc#1252535 * bsc#1252536 * bsc#1252537 * bsc#1252538 * bsc#1252539 * bsc#1252542 * bsc#1252545 * bsc#1252549 * bsc#1252554 * bsc#1252560 * bsc#1252564 * bsc#1252565 * bsc#1252568 * bsc#1252634 * bsc#1252688 * bsc#1252785 * bsc#1252893 * bsc#1252904 * bsc#1252919 * jsc#PED-4593 * jsc#PED-568 Cross-References: * CVE-2022-43945 * CVE-2022-50327 * CVE-2022-50334 * CVE-2022-50470 * CVE-2022-50471 * CVE-2022-50472 * CVE-2022-50475 * CVE-2022-50478 * CVE-2022-50480 * CVE-2022-50482 * CVE-2022-50484 * CVE-2022-50485 * CVE-2022-50487 * CVE-2022-50488 * CVE-2022-50489 * CVE-2022-50490 * CVE-2022-50492 * CVE-2022-50493 * CVE-2022-50494 * CVE-2022-50496 * CVE-2022-50497 * CVE-2022-50498 * CVE-2022-50499 * CVE-2022-50501 * CVE-2022-50503 * CVE-2022-50504 * CVE-2022-50505 * CVE-2022-50509 * CVE-2022-50511 * CVE-2022-50512 * CVE-2022-50513 * CVE-2022-50514 * CVE-2022-50516 * CVE-2022-50519 * CVE-2022-50520 * CVE-2022-50521 * CVE-2022-50523 * CVE-2022-50525 * CVE-2022-50528 * CVE-2022-50529 * CVE-2022-50530 * CVE-2022-50532 * CVE-2022-50534 * CVE-2022-50535 * CVE-2022-50537 * CVE-2022-50541 * CVE-2022-50542 * CVE-2022-50544 * CVE-2022-50545 * CVE-2022-50546 * CVE-2022-50549 * CVE-2022-50551 * CVE-2022-50553 * CVE-2022-50556 * CVE-2022-50559 * CVE-2022-50560 * CVE-2022-50561 * CVE-2022-50562 * CVE-2022-50563 * CVE-2022-50564 * CVE-2022-50566 * CVE-2022-50567 * CVE-2022-50568 * CVE-2022-50570 * CVE-2022-50572 * CVE-2022-50574 * CVE-2022-50575 * CVE-2022-50576 * CVE-2022-50578 * CVE-2022-50579 * CVE-2022-50580 * CVE-2022-50581 * CVE-2022-50582 * CVE-2023-52923 * CVE-2023-53365 * CVE-2023-53500 * CVE-2023-53533 * CVE-2023-53534 * CVE-2023-53541 * CVE-2023-53542 * CVE-2023-53548 * CVE-2023-53551 * CVE-2023-53552 * CVE-2023-53553 * CVE-2023-53554 * CVE-2023-53556 * CVE-2023-53559 * CVE-2023-53560 * CVE-2023-53564 * CVE-2023-53566 * CVE-2023-53567 * CVE-2023-53568 * CVE-2023-53571 * CVE-2023-53572 * CVE-2023-53574 * CVE-2023-53576 * CVE-2023-53579 * CVE-2023-53582 * CVE-2023-53587 * CVE-2023-53589 * CVE-2023-53592 * CVE-2023-53594 * CVE-2023-53597 * CVE-2023-53603 * CVE-2023-53604 * CVE-2023-53605 * CVE-2023-53607 * CVE-2023-53608 * CVE-2023-53611 * CVE-2023-53612 * CVE-2023-53615 * CVE-2023-53616 * CVE-2023-53617 * CVE-2023-53619 * CVE-2023-53622 * CVE-2023-53625 * CVE-2023-53626 * CVE-2023-53631 * CVE-2023-53637 * CVE-2023-53639 * CVE-2023-53640 * CVE-2023-53641 * CVE-2023-53644 * CVE-2023-53648 * CVE-2023-53650 * CVE-2023-53651 * CVE-2023-53658 * CVE-2023-53659 * CVE-2023-53662 * CVE-2023-53667 * CVE-2023-53668 * CVE-2023-53670 * CVE-2023-53673 * CVE-2023-53674 * CVE-2023-53675 * CVE-2023-53679 * CVE-2023-53680 * CVE-2023-53681 * CVE-2023-53683 * CVE-2023-53687 * CVE-2023-53692 * CVE-2023-53693 * CVE-2023-53695 * CVE-2023-53696 * CVE-2023-53700 * CVE-2023-53704 * CVE-2023-53705 * CVE-2023-53708 * CVE-2023-53709 * CVE-2023-53711 * CVE-2023-53715 * CVE-2023-53717 * CVE-2023-53718 * CVE-2023-53719 * CVE-2023-53722 * CVE-2023-53723 * CVE-2023-53724 * CVE-2023-53725 * CVE-2023-53726 * CVE-2023-53730 * CVE-2023-7324 * CVE-2025-39742 * CVE-2025-39797 * CVE-2025-39945 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-40018 * CVE-2025-40044 * CVE-2025-40088 * CVE-2025-40102 CVSS scores: * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50334 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50334 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50470 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50470 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50471 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50475 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50478 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50480 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50482 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50482 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50485 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50485 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50487 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50487 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50488 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50489 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50492 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50492 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50493 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50493 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50494 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50496 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50496 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50497 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50498 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50498 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50499 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50499 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50512 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50513 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50519 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50519 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-50520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50528 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50541 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-50541 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-50542 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50542 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50556 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50560 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50561 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50561 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50563 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50563 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50566 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50566 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50567 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50567 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50570 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50570 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50575 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-50575 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-50576 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50576 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50578 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50579 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50579 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50580 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50580 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50581 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50582 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50582 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53587 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53587 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53589 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2023-53592 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53592 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53604 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53604 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53605 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53605 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53608 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53608 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53612 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53612 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53616 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53619 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53622 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53626 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53626 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53639 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53639 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53640 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53640 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53644 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53650 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53651 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53651 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53662 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53667 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53667 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53668 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53670 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53674 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53680 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53680 ( SUSE ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53681 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53683 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53683 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53687 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53695 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53695 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53704 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53705 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2023-53708 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53711 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53718 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53719 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53719 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53723 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53723 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53724 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53724 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53725 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53730 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7324 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-7324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40088 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40088 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves 173 vulnerabilities, contains two features and has 19 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859). * CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164). * CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741). * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988). * CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816). * CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052). * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222). * CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743). * CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763). * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554). * CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785). * CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). The following non security issues were fixed: * fbcon: Fix OOB access in font allocation (bsc#1252033) * mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823). * net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4111=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-4111=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4111=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4111=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4111=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4111=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4111=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4111=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4111=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4111=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.184.1 * kernel-source-vanilla-5.14.21-150400.24.184.1 * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.184.1 * kernel-kvmsmall-devel-5.14.21-150400.24.184.1 * kernel-default-base-rebuild-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-kvmsmall-debugsource-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.184.1 * cluster-md-kmp-default-5.14.21-150400.24.184.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-livepatch-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * ocfs2-kmp-default-5.14.21-150400.24.184.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-extra-5.14.21-150400.24.184.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-optional-5.14.21-150400.24.184.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-qa-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kselftests-kmp-default-5.14.21-150400.24.184.1 * gfs2-kmp-default-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1 * kernel-default-livepatch-devel-5.14.21-150400.24.184.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64) * dtb-freescale-5.14.21-150400.24.184.1 * kernel-64kb-extra-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * dtb-lg-5.14.21-150400.24.184.1 * dtb-socionext-5.14.21-150400.24.184.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.184.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * ocfs2-kmp-64kb-5.14.21-150400.24.184.1 * dtb-exynos-5.14.21-150400.24.184.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-64kb-5.14.21-150400.24.184.1 * dtb-broadcom-5.14.21-150400.24.184.1 * dtb-arm-5.14.21-150400.24.184.1 * dtb-rockchip-5.14.21-150400.24.184.1 * dtb-mediatek-5.14.21-150400.24.184.1 * dtb-hisilicon-5.14.21-150400.24.184.1 * dtb-amazon-5.14.21-150400.24.184.1 * dtb-xilinx-5.14.21-150400.24.184.1 * dtb-marvell-5.14.21-150400.24.184.1 * cluster-md-kmp-64kb-5.14.21-150400.24.184.1 * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-optional-5.14.21-150400.24.184.1 * dtb-apple-5.14.21-150400.24.184.1 * dtb-cavium-5.14.21-150400.24.184.1 * kselftests-kmp-64kb-5.14.21-150400.24.184.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.184.1 * dlm-kmp-64kb-5.14.21-150400.24.184.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * dtb-sprd-5.14.21-150400.24.184.1 * dtb-allwinner-5.14.21-150400.24.184.1 * reiserfs-kmp-64kb-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * dtb-altera-5.14.21-150400.24.184.1 * dtb-amlogic-5.14.21-150400.24.184.1 * dtb-qcom-5.14.21-150400.24.184.1 * dtb-renesas-5.14.21-150400.24.184.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * dtb-nvidia-5.14.21-150400.24.184.1 * dtb-amd-5.14.21-150400.24.184.1 * dtb-apm-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.184.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * cluster-md-kmp-default-5.14.21-150400.24.184.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * ocfs2-kmp-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1 * kernel-default-livepatch-5.14.21-150400.24.184.1 * kernel-default-livepatch-devel-5.14.21-150400.24.184.1 ## References: * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50334.html * https://www.suse.com/security/cve/CVE-2022-50470.html * https://www.suse.com/security/cve/CVE-2022-50471.html * https://www.suse.com/security/cve/CVE-2022-50472.html * https://www.suse.com/security/cve/CVE-2022-50475.html * https://www.suse.com/security/cve/CVE-2022-50478.html * https://www.suse.com/security/cve/CVE-2022-50480.html * https://www.suse.com/security/cve/CVE-2022-50482.html * https://www.suse.com/security/cve/CVE-2022-50484.html * https://www.suse.com/security/cve/CVE-2022-50485.html * https://www.suse.com/security/cve/CVE-2022-50487.html * https://www.suse.com/security/cve/CVE-2022-50488.html * https://www.suse.com/security/cve/CVE-2022-50489.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2022-50492.html * https://www.suse.com/security/cve/CVE-2022-50493.html * https://www.suse.com/security/cve/CVE-2022-50494.html * https://www.suse.com/security/cve/CVE-2022-50496.html * https://www.suse.com/security/cve/CVE-2022-50497.html * https://www.suse.com/security/cve/CVE-2022-50498.html * https://www.suse.com/security/cve/CVE-2022-50499.html * https://www.suse.com/security/cve/CVE-2022-50501.html * https://www.suse.com/security/cve/CVE-2022-50503.html * https://www.suse.com/security/cve/CVE-2022-50504.html * https://www.suse.com/security/cve/CVE-2022-50505.html * https://www.suse.com/security/cve/CVE-2022-50509.html * https://www.suse.com/security/cve/CVE-2022-50511.html * https://www.suse.com/security/cve/CVE-2022-50512.html * https://www.suse.com/security/cve/CVE-2022-50513.html * https://www.suse.com/security/cve/CVE-2022-50514.html * https://www.suse.com/security/cve/CVE-2022-50516.html * https://www.suse.com/security/cve/CVE-2022-50519.html * https://www.suse.com/security/cve/CVE-2022-50520.html * https://www.suse.com/security/cve/CVE-2022-50521.html * https://www.suse.com/security/cve/CVE-2022-50523.html * https://www.suse.com/security/cve/CVE-2022-50525.html * https://www.suse.com/security/cve/CVE-2022-50528.html * https://www.suse.com/security/cve/CVE-2022-50529.html * https://www.suse.com/security/cve/CVE-2022-50530.html * https://www.suse.com/security/cve/CVE-2022-50532.html * https://www.suse.com/security/cve/CVE-2022-50534.html * https://www.suse.com/security/cve/CVE-2022-50535.html * https://www.suse.com/security/cve/CVE-2022-50537.html * https://www.suse.com/security/cve/CVE-2022-50541.html * https://www.suse.com/security/cve/CVE-2022-50542.html * https://www.suse.com/security/cve/CVE-2022-50544.html * https://www.suse.com/security/cve/CVE-2022-50545.html * https://www.suse.com/security/cve/CVE-2022-50546.html * https://www.suse.com/security/cve/CVE-2022-50549.html * https://www.suse.com/security/cve/CVE-2022-50551.html * https://www.suse.com/security/cve/CVE-2022-50553.html * https://www.suse.com/security/cve/CVE-2022-50556.html * https://www.suse.com/security/cve/CVE-2022-50559.html * https://www.suse.com/security/cve/CVE-2022-50560.html * https://www.suse.com/security/cve/CVE-2022-50561.html * https://www.suse.com/security/cve/CVE-2022-50562.html * https://www.suse.com/security/cve/CVE-2022-50563.html * https://www.suse.com/security/cve/CVE-2022-50564.html * https://www.suse.com/security/cve/CVE-2022-50566.html * https://www.suse.com/security/cve/CVE-2022-50567.html * https://www.suse.com/security/cve/CVE-2022-50568.html * https://www.suse.com/security/cve/CVE-2022-50570.html * https://www.suse.com/security/cve/CVE-2022-50572.html * https://www.suse.com/security/cve/CVE-2022-50574.html * https://www.suse.com/security/cve/CVE-2022-50575.html * https://www.suse.com/security/cve/CVE-2022-50576.html * https://www.suse.com/security/cve/CVE-2022-50578.html * https://www.suse.com/security/cve/CVE-2022-50579.html * https://www.suse.com/security/cve/CVE-2022-50580.html * https://www.suse.com/security/cve/CVE-2022-50581.html * https://www.suse.com/security/cve/CVE-2022-50582.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53533.html * https://www.suse.com/security/cve/CVE-2023-53534.html * https://www.suse.com/security/cve/CVE-2023-53541.html * https://www.suse.com/security/cve/CVE-2023-53542.html * https://www.suse.com/security/cve/CVE-2023-53548.html * https://www.suse.com/security/cve/CVE-2023-53551.html * https://www.suse.com/security/cve/CVE-2023-53552.html * https://www.suse.com/security/cve/CVE-2023-53553.html * https://www.suse.com/security/cve/CVE-2023-53554.html * https://www.suse.com/security/cve/CVE-2023-53556.html * https://www.suse.com/security/cve/CVE-2023-53559.html * https://www.suse.com/security/cve/CVE-2023-53560.html * https://www.suse.com/security/cve/CVE-2023-53564.html * https://www.suse.com/security/cve/CVE-2023-53566.html * https://www.suse.com/security/cve/CVE-2023-53567.html * https://www.suse.com/security/cve/CVE-2023-53568.html * https://www.suse.com/security/cve/CVE-2023-53571.html * https://www.suse.com/security/cve/CVE-2023-53572.html * https://www.suse.com/security/cve/CVE-2023-53574.html * https://www.suse.com/security/cve/CVE-2023-53576.html * https://www.suse.com/security/cve/CVE-2023-53579.html * https://www.suse.com/security/cve/CVE-2023-53582.html * https://www.suse.com/security/cve/CVE-2023-53587.html * https://www.suse.com/security/cve/CVE-2023-53589.html * https://www.suse.com/security/cve/CVE-2023-53592.html * https://www.suse.com/security/cve/CVE-2023-53594.html * https://www.suse.com/security/cve/CVE-2023-53597.html * https://www.suse.com/security/cve/CVE-2023-53603.html * https://www.suse.com/security/cve/CVE-2023-53604.html * https://www.suse.com/security/cve/CVE-2023-53605.html * https://www.suse.com/security/cve/CVE-2023-53607.html * https://www.suse.com/security/cve/CVE-2023-53608.html * https://www.suse.com/security/cve/CVE-2023-53611.html * https://www.suse.com/security/cve/CVE-2023-53612.html * https://www.suse.com/security/cve/CVE-2023-53615.html * https://www.suse.com/security/cve/CVE-2023-53616.html * https://www.suse.com/security/cve/CVE-2023-53617.html * https://www.suse.com/security/cve/CVE-2023-53619.html * https://www.suse.com/security/cve/CVE-2023-53622.html * https://www.suse.com/security/cve/CVE-2023-53625.html * https://www.suse.com/security/cve/CVE-2023-53626.html * https://www.suse.com/security/cve/CVE-2023-53631.html * https://www.suse.com/security/cve/CVE-2023-53637.html * https://www.suse.com/security/cve/CVE-2023-53639.html * https://www.suse.com/security/cve/CVE-2023-53640.html * https://www.suse.com/security/cve/CVE-2023-53641.html * https://www.suse.com/security/cve/CVE-2023-53644.html * https://www.suse.com/security/cve/CVE-2023-53648.html * https://www.suse.com/security/cve/CVE-2023-53650.html * https://www.suse.com/security/cve/CVE-2023-53651.html * https://www.suse.com/security/cve/CVE-2023-53658.html * https://www.suse.com/security/cve/CVE-2023-53659.html * https://www.suse.com/security/cve/CVE-2023-53662.html * https://www.suse.com/security/cve/CVE-2023-53667.html * https://www.suse.com/security/cve/CVE-2023-53668.html * https://www.suse.com/security/cve/CVE-2023-53670.html * https://www.suse.com/security/cve/CVE-2023-53673.html * https://www.suse.com/security/cve/CVE-2023-53674.html * https://www.suse.com/security/cve/CVE-2023-53675.html * https://www.suse.com/security/cve/CVE-2023-53679.html * https://www.suse.com/security/cve/CVE-2023-53680.html * https://www.suse.com/security/cve/CVE-2023-53681.html * https://www.suse.com/security/cve/CVE-2023-53683.html * https://www.suse.com/security/cve/CVE-2023-53687.html * https://www.suse.com/security/cve/CVE-2023-53692.html * https://www.suse.com/security/cve/CVE-2023-53693.html * https://www.suse.com/security/cve/CVE-2023-53695.html * https://www.suse.com/security/cve/CVE-2023-53696.html * https://www.suse.com/security/cve/CVE-2023-53700.html * https://www.suse.com/security/cve/CVE-2023-53704.html * https://www.suse.com/security/cve/CVE-2023-53705.html * https://www.suse.com/security/cve/CVE-2023-53708.html * https://www.suse.com/security/cve/CVE-2023-53709.html * https://www.suse.com/security/cve/CVE-2023-53711.html * https://www.suse.com/security/cve/CVE-2023-53715.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2023-53718.html * https://www.suse.com/security/cve/CVE-2023-53719.html * https://www.suse.com/security/cve/CVE-2023-53722.html * https://www.suse.com/security/cve/CVE-2023-53723.html * https://www.suse.com/security/cve/CVE-2023-53724.html * https://www.suse.com/security/cve/CVE-2023-53725.html * https://www.suse.com/security/cve/CVE-2023-53726.html * https://www.suse.com/security/cve/CVE-2023-53730.html * https://www.suse.com/security/cve/CVE-2023-7324.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40088.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206893 * https://bugzilla.suse.com/show_bug.cgi?id=1207612 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211692 * https://bugzilla.suse.com/show_bug.cgi?id=1213098 * https://bugzilla.suse.com/show_bug.cgi?id=1213114 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1214992 * https://bugzilla.suse.com/show_bug.cgi?id=1215148 * https://bugzilla.suse.com/show_bug.cgi?id=1217366 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249857 * https://bugzilla.suse.com/show_bug.cgi?id=1249859 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251027 * https://bugzilla.suse.com/show_bug.cgi?id=1251032 * https://bugzilla.suse.com/show_bug.cgi?id=1251034 * https://bugzilla.suse.com/show_bug.cgi?id=1251035 * https://bugzilla.suse.com/show_bug.cgi?id=1251040 * https://bugzilla.suse.com/show_bug.cgi?id=1251043 * https://bugzilla.suse.com/show_bug.cgi?id=1251045 * https://bugzilla.suse.com/show_bug.cgi?id=1251047 * https://bugzilla.suse.com/show_bug.cgi?id=1251052 * https://bugzilla.suse.com/show_bug.cgi?id=1251057 * https://bugzilla.suse.com/show_bug.cgi?id=1251059 * https://bugzilla.suse.com/show_bug.cgi?id=1251061 * https://bugzilla.suse.com/show_bug.cgi?id=1251063 * https://bugzilla.suse.com/show_bug.cgi?id=1251064 * https://bugzilla.suse.com/show_bug.cgi?id=1251065 * https://bugzilla.suse.com/show_bug.cgi?id=1251066 * https://bugzilla.suse.com/show_bug.cgi?id=1251068 * https://bugzilla.suse.com/show_bug.cgi?id=1251072 * https://bugzilla.suse.com/show_bug.cgi?id=1251080 * https://bugzilla.suse.com/show_bug.cgi?id=1251082 * https://bugzilla.suse.com/show_bug.cgi?id=1251086 * https://bugzilla.suse.com/show_bug.cgi?id=1251087 * https://bugzilla.suse.com/show_bug.cgi?id=1251088 * https://bugzilla.suse.com/show_bug.cgi?id=1251091 * https://bugzilla.suse.com/show_bug.cgi?id=1251092 * https://bugzilla.suse.com/show_bug.cgi?id=1251093 * https://bugzilla.suse.com/show_bug.cgi?id=1251097 * https://bugzilla.suse.com/show_bug.cgi?id=1251099 * https://bugzilla.suse.com/show_bug.cgi?id=1251101 * https://bugzilla.suse.com/show_bug.cgi?id=1251104 * https://bugzilla.suse.com/show_bug.cgi?id=1251110 * https://bugzilla.suse.com/show_bug.cgi?id=1251113 * https://bugzilla.suse.com/show_bug.cgi?id=1251115 * https://bugzilla.suse.com/show_bug.cgi?id=1251123 * https://bugzilla.suse.com/show_bug.cgi?id=1251128 * https://bugzilla.suse.com/show_bug.cgi?id=1251129 * https://bugzilla.suse.com/show_bug.cgi?id=1251133 * https://bugzilla.suse.com/show_bug.cgi?id=1251136 * https://bugzilla.suse.com/show_bug.cgi?id=1251147 * https://bugzilla.suse.com/show_bug.cgi?id=1251149 * https://bugzilla.suse.com/show_bug.cgi?id=1251154 * https://bugzilla.suse.com/show_bug.cgi?id=1251159 * https://bugzilla.suse.com/show_bug.cgi?id=1251164 * https://bugzilla.suse.com/show_bug.cgi?id=1251166 * https://bugzilla.suse.com/show_bug.cgi?id=1251169 * https://bugzilla.suse.com/show_bug.cgi?id=1251170 * https://bugzilla.suse.com/show_bug.cgi?id=1251173 * https://bugzilla.suse.com/show_bug.cgi?id=1251178 * https://bugzilla.suse.com/show_bug.cgi?id=1251180 * https://bugzilla.suse.com/show_bug.cgi?id=1251182 * https://bugzilla.suse.com/show_bug.cgi?id=1251197 * https://bugzilla.suse.com/show_bug.cgi?id=1251200 * https://bugzilla.suse.com/show_bug.cgi?id=1251201 * https://bugzilla.suse.com/show_bug.cgi?id=1251202 * https://bugzilla.suse.com/show_bug.cgi?id=1251208 * https://bugzilla.suse.com/show_bug.cgi?id=1251210 * https://bugzilla.suse.com/show_bug.cgi?id=1251215 * https://bugzilla.suse.com/show_bug.cgi?id=1251218 * https://bugzilla.suse.com/show_bug.cgi?id=1251222 * https://bugzilla.suse.com/show_bug.cgi?id=1251223 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251247 * https://bugzilla.suse.com/show_bug.cgi?id=1251268 * https://bugzilla.suse.com/show_bug.cgi?id=1251281 * https://bugzilla.suse.com/show_bug.cgi?id=1251282 * https://bugzilla.suse.com/show_bug.cgi?id=1251283 * https://bugzilla.suse.com/show_bug.cgi?id=1251285 * https://bugzilla.suse.com/show_bug.cgi?id=1251286 * https://bugzilla.suse.com/show_bug.cgi?id=1251292 * https://bugzilla.suse.com/show_bug.cgi?id=1251294 * https://bugzilla.suse.com/show_bug.cgi?id=1251295 * https://bugzilla.suse.com/show_bug.cgi?id=1251296 * https://bugzilla.suse.com/show_bug.cgi?id=1251298 * https://bugzilla.suse.com/show_bug.cgi?id=1251299 * https://bugzilla.suse.com/show_bug.cgi?id=1251300 * https://bugzilla.suse.com/show_bug.cgi?id=1251302 * https://bugzilla.suse.com/show_bug.cgi?id=1251303 * https://bugzilla.suse.com/show_bug.cgi?id=1251306 * https://bugzilla.suse.com/show_bug.cgi?id=1251310 * https://bugzilla.suse.com/show_bug.cgi?id=1251312 * https://bugzilla.suse.com/show_bug.cgi?id=1251322 * https://bugzilla.suse.com/show_bug.cgi?id=1251324 * https://bugzilla.suse.com/show_bug.cgi?id=1251325 * https://bugzilla.suse.com/show_bug.cgi?id=1251326 * https://bugzilla.suse.com/show_bug.cgi?id=1251327 * https://bugzilla.suse.com/show_bug.cgi?id=1251329 * https://bugzilla.suse.com/show_bug.cgi?id=1251330 * https://bugzilla.suse.com/show_bug.cgi?id=1251331 * https://bugzilla.suse.com/show_bug.cgi?id=1251519 * https://bugzilla.suse.com/show_bug.cgi?id=1251521 * https://bugzilla.suse.com/show_bug.cgi?id=1251522 * https://bugzilla.suse.com/show_bug.cgi?id=1251527 * https://bugzilla.suse.com/show_bug.cgi?id=1251529 * https://bugzilla.suse.com/show_bug.cgi?id=1251550 * https://bugzilla.suse.com/show_bug.cgi?id=1251723 * https://bugzilla.suse.com/show_bug.cgi?id=1251725 * https://bugzilla.suse.com/show_bug.cgi?id=1251728 * https://bugzilla.suse.com/show_bug.cgi?id=1251730 * https://bugzilla.suse.com/show_bug.cgi?id=1251736 * https://bugzilla.suse.com/show_bug.cgi?id=1251737 * https://bugzilla.suse.com/show_bug.cgi?id=1251741 * https://bugzilla.suse.com/show_bug.cgi?id=1251743 * https://bugzilla.suse.com/show_bug.cgi?id=1251750 * https://bugzilla.suse.com/show_bug.cgi?id=1251753 * https://bugzilla.suse.com/show_bug.cgi?id=1251759 * https://bugzilla.suse.com/show_bug.cgi?id=1251761 * https://bugzilla.suse.com/show_bug.cgi?id=1251762 * https://bugzilla.suse.com/show_bug.cgi?id=1251763 * https://bugzilla.suse.com/show_bug.cgi?id=1251764 * https://bugzilla.suse.com/show_bug.cgi?id=1251767 * https://bugzilla.suse.com/show_bug.cgi?id=1251769 * https://bugzilla.suse.com/show_bug.cgi?id=1251772 * https://bugzilla.suse.com/show_bug.cgi?id=1251775 * https://bugzilla.suse.com/show_bug.cgi?id=1251777 * https://bugzilla.suse.com/show_bug.cgi?id=1251785 * https://bugzilla.suse.com/show_bug.cgi?id=1251823 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252474 * https://bugzilla.suse.com/show_bug.cgi?id=1252475 * https://bugzilla.suse.com/show_bug.cgi?id=1252476 * https://bugzilla.suse.com/show_bug.cgi?id=1252480 * https://bugzilla.suse.com/show_bug.cgi?id=1252484 * https://bugzilla.suse.com/show_bug.cgi?id=1252486 * https://bugzilla.suse.com/show_bug.cgi?id=1252489 * https://bugzilla.suse.com/show_bug.cgi?id=1252490 * https://bugzilla.suse.com/show_bug.cgi?id=1252492 * https://bugzilla.suse.com/show_bug.cgi?id=1252495 * https://bugzilla.suse.com/show_bug.cgi?id=1252497 * https://bugzilla.suse.com/show_bug.cgi?id=1252499 * https://bugzilla.suse.com/show_bug.cgi?id=1252501 * https://bugzilla.suse.com/show_bug.cgi?id=1252508 * https://bugzilla.suse.com/show_bug.cgi?id=1252509 * https://bugzilla.suse.com/show_bug.cgi?id=1252513 * https://bugzilla.suse.com/show_bug.cgi?id=1252515 * https://bugzilla.suse.com/show_bug.cgi?id=1252516 * https://bugzilla.suse.com/show_bug.cgi?id=1252519 * https://bugzilla.suse.com/show_bug.cgi?id=1252521 * https://bugzilla.suse.com/show_bug.cgi?id=1252522 * https://bugzilla.suse.com/show_bug.cgi?id=1252523 * https://bugzilla.suse.com/show_bug.cgi?id=1252526 * https://bugzilla.suse.com/show_bug.cgi?id=1252528 * https://bugzilla.suse.com/show_bug.cgi?id=1252529 * https://bugzilla.suse.com/show_bug.cgi?id=1252532 * https://bugzilla.suse.com/show_bug.cgi?id=1252535 * https://bugzilla.suse.com/show_bug.cgi?id=1252536 * https://bugzilla.suse.com/show_bug.cgi?id=1252537 * https://bugzilla.suse.com/show_bug.cgi?id=1252538 * https://bugzilla.suse.com/show_bug.cgi?id=1252539 * https://bugzilla.suse.com/show_bug.cgi?id=1252542 * https://bugzilla.suse.com/show_bug.cgi?id=1252545 * https://bugzilla.suse.com/show_bug.cgi?id=1252549 * https://bugzilla.suse.com/show_bug.cgi?id=1252554 * https://bugzilla.suse.com/show_bug.cgi?id=1252560 * https://bugzilla.suse.com/show_bug.cgi?id=1252564 * https://bugzilla.suse.com/show_bug.cgi?id=1252565 * https://bugzilla.suse.com/show_bug.cgi?id=1252568 * https://bugzilla.suse.com/show_bug.cgi?id=1252634 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252893 * https://bugzilla.suse.com/show_bug.cgi?id=1252904 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 18 12:30:05 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 18 Nov 2025 12:30:05 -0000 Subject: SUSE-RU-2025:4127-1: moderate: Recommended update for gnu-free-fonts Message-ID: <176346900567.20308.9707668724773683047@smelt2.prg2.suse.org> # Recommended update for gnu-free-fonts Announcement ID: SUSE-RU-2025:4127-1 Release Date: 2025-11-18T11:11:14Z Rating: moderate References: * bsc#1252150 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for gnu-free-fonts fixes the following issue: * Mark COPYING as %license (bsc#1252150). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4127=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4127=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4127=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4127=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4127=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4127=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4127=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4127=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4127=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4127=1 ## Package List: * openSUSE Leap 15.6 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * Basesystem Module 15-SP6 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * Basesystem Module 15-SP7 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Manager Proxy 4.3 LTS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Manager Server 4.3 LTS (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 * SUSE Enterprise Storage 7.1 (noarch) * gnu-free-fonts-0.20120503-150000.4.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252150 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 20 12:30:13 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 20 Nov 2025 12:30:13 -0000 Subject: SUSE-RU-2025:4146-1: moderate: Recommended update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda Message-ID: <176364181341.7709.3461620024196622489@smelt2.prg2.suse.org> # Recommended update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda Announcement ID: SUSE-RU-2025:4146-1 Release Date: 2025-11-20T08:47:43Z Rating: moderate References: * bsc#1252978 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia- persistenced.cuda fixes the following issues: Changes in nvidia-modprobe.cuda: * update to version 580.105.08 Changes in nvidia-persistenced.cuda: * update to version 580.105.08 Changes in nvidia-open-driver-G06-signed: * introduced extra %gfx_aarch64_version and appropriate tarball/pci_id file in the hope that build service will no longer complain * update CUDA variant to 580.105.08 * back to 580.95.05 on aarch64, since userspace drivers have not been updated for this platform * update non-CUDA variant to version 580.105.08 (bsc#1252978) * update CUDA variant to 580.95.05 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4146=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4146=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4146=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4146=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4146=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4146=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4146=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4146=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4146=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4146=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4146=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4146=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-modprobe-debugsource-580.105.08-150400.9.9.1 * nvidia-persistenced-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debugsource-580.105.08-150400.9.9.1 * nvidia-modprobe-debuginfo-580.105.08-150400.9.9.1 * nvidia-persistenced-debuginfo-580.105.08-150400.9.9.1 * nvidia-modprobe-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * openSUSE Leap 15.4 (noarch) * nvidia-open-driver-G06-signed-check-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-check-580.105.08-150400.104.2 * openSUSE Leap 15.4 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * openSUSE Leap 15.4 (aarch64) * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-64kb-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-64kb-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64) * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.3 (aarch64) * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.3 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64) * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.4 (aarch64) * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Micro 5.4 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-modprobe-debugsource-580.105.08-150400.9.9.1 * nvidia-persistenced-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debugsource-580.105.08-150400.9.9.1 * nvidia-modprobe-debuginfo-580.105.08-150400.9.9.1 * nvidia-persistenced-debuginfo-580.105.08-150400.9.9.1 * nvidia-modprobe-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-64kb-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-64kb-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-modprobe-debugsource-580.105.08-150400.9.9.1 * nvidia-persistenced-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debugsource-580.105.08-150400.9.9.1 * nvidia-modprobe-debuginfo-580.105.08-150400.9.9.1 * nvidia-persistenced-debuginfo-580.105.08-150400.9.9.1 * nvidia-modprobe-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-64kb-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-64kb-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-modprobe-debugsource-580.105.08-150400.9.9.1 * nvidia-persistenced-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debugsource-580.105.08-150400.9.9.1 * nvidia-modprobe-debuginfo-580.105.08-150400.9.9.1 * nvidia-persistenced-debuginfo-580.105.08-150400.9.9.1 * nvidia-modprobe-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.95.05_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-64kb-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-64kb-devel-580.95.05-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.95.05_k5.14.21_150400.24.179-150400.104.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * nvidia-modprobe-debugsource-580.105.08-150400.9.9.1 * nvidia-persistenced-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debugsource-580.105.08-150400.9.9.1 * nvidia-modprobe-debuginfo-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-persistenced-debuginfo-580.105.08-150400.9.9.1 * nvidia-modprobe-580.105.08-150400.9.9.1 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 * SUSE Manager Server 4.3 LTS (x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nv-prefer-signed-open-driver-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.105.08_k5.14.21_150400.24.179-150400.104.2 * nvidia-open-driver-G06-signed-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-default-devel-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150400.104.2 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150400.104.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252978 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 21 16:30:09 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 21 Nov 2025 16:30:09 -0000 Subject: SUSE-SU-2025:4159-1: important: Security update for tomcat Message-ID: <176374260979.8070.15287330478379466459@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:4159-1 Release Date: 2025-11-21T14:32:43Z Rating: important References: * bsc#1252753 * bsc#1252756 * bsc#1252905 Cross-References: * CVE-2025-55752 * CVE-2025-55754 * CVE-2025-61795 CVSS scores: * CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55752 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55754 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61795 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * Web and Scripting Module 15-SP6 * Web and Scripting Module 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: Update to Tomcat 9.0.111: * CVE-2025-55752: Fixed directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753) * CVE-2025-55754: Fixed improper neutralization of escape, meta, or control sequences vulnerability (bsc#1252905) * CVE-2025-61795: Fixed denial of service due to temporary copies during the processing of multipart upload (bsc#1252756) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4159=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4159=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-4159=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-4159=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4159=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4159=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4159=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4159=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4159=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4159=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4159=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4159=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4159=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4159=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4159=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4159=1 ## Package List: * SUSE Enterprise Storage 7.1 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * openSUSE Leap 15.6 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-jsvc-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-javadoc-9.0.111-150200.96.1 * tomcat-embed-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * tomcat-docs-webapp-9.0.111-150200.96.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * Web and Scripting Module 15-SP7 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 * SUSE Manager Server 4.3 LTS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.96.1 * tomcat-9.0.111-150200.96.1 * tomcat-lib-9.0.111-150200.96.1 * tomcat-webapps-9.0.111-150200.96.1 * tomcat-admin-webapps-9.0.111-150200.96.1 * tomcat-el-3_0-api-9.0.111-150200.96.1 * tomcat-jsp-2_3-api-9.0.111-150200.96.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55752.html * https://www.suse.com/security/cve/CVE-2025-55754.html * https://www.suse.com/security/cve/CVE-2025-61795.html * https://bugzilla.suse.com/show_bug.cgi?id=1252753 * https://bugzilla.suse.com/show_bug.cgi?id=1252756 * https://bugzilla.suse.com/show_bug.cgi?id=1252905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 24 08:30:33 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 24 Nov 2025 08:30:33 -0000 Subject: SUSE-SU-2025:4181-1: important: Security update for sssd Message-ID: <176397303366.22596.7557897525446404938@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2025:4181-1 Release Date: 2025-11-24T07:55:47Z Rating: important References: * bsc#1244325 * bsc#1251827 Cross-References: * CVE-2025-11561 CVSS scores: * CVE-2025-11561 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-11561 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11561 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2025-11561: Fixed privilege escalation on AD-joined Linux systems due to default Kerberos configuration disabling localauth an2ln plugin (bsc#1251827) Other fixes: * Install file in krb5.conf.d to include sssd krb5 config snippets (bsc#1244325) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4181=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4181=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4181=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4181=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4181=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4181=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4181=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4181=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4181=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4181=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4181=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4181=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Manager Server 4.3 LTS (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * python3-ipa_hbac-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * libnfsidmap-sss-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * python3-sss-murmur-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * python3-sss_nss_idmap-debuginfo-2.5.2-150400.4.40.1 * python3-sss-murmur-2.5.2-150400.4.40.1 * python3-sss_nss_idmap-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * python3-ipa_hbac-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libnfsidmap-sss-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * openSUSE Leap 15.4 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * openSUSE Leap 15.4 (aarch64_ilp32) * sssd-common-64bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-64bit-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * sssd-2.5.2-150400.4.40.1 * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * sssd-2.5.2-150400.4.40.1 * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * sssd-2.5.2-150400.4.40.1 * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * sssd-2.5.2-150400.4.40.1 * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * sssd-ldap-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-2.5.2-150400.4.40.1 * libipa_hbac-devel-2.5.2-150400.4.40.1 * sssd-proxy-debuginfo-2.5.2-150400.4.40.1 * sssd-proxy-2.5.2-150400.4.40.1 * sssd-winbind-idmap-2.5.2-150400.4.40.1 * sssd-krb5-2.5.2-150400.4.40.1 * sssd-ipa-2.5.2-150400.4.40.1 * sssd-tools-debuginfo-2.5.2-150400.4.40.1 * sssd-tools-2.5.2-150400.4.40.1 * libsss_idmap-devel-2.5.2-150400.4.40.1 * sssd-kcm-debuginfo-2.5.2-150400.4.40.1 * sssd-ad-debuginfo-2.5.2-150400.4.40.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.40.1 * libsss_simpleifp-devel-2.5.2-150400.4.40.1 * sssd-dbus-2.5.2-150400.4.40.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-common-2.5.2-150400.4.40.1 * sssd-common-debuginfo-2.5.2-150400.4.40.1 * libsss_certmap-devel-2.5.2-150400.4.40.1 * python3-sssd-config-2.5.2-150400.4.40.1 * sssd-dbus-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap-devel-2.5.2-150400.4.40.1 * sssd-ad-2.5.2-150400.4.40.1 * sssd-ipa-debuginfo-2.5.2-150400.4.40.1 * sssd-ldap-2.5.2-150400.4.40.1 * libsss_certmap0-2.5.2-150400.4.40.1 * libipa_hbac0-2.5.2-150400.4.40.1 * libsss_simpleifp0-2.5.2-150400.4.40.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.40.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.40.1 * sssd-2.5.2-150400.4.40.1 * sssd-debugsource-2.5.2-150400.4.40.1 * sssd-common-2.5.2-150400.4.40.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.40.1 * sssd-krb5-debuginfo-2.5.2-150400.4.40.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.40.1 * sssd-kcm-2.5.2-150400.4.40.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.40.1 * libsss_nss_idmap0-2.5.2-150400.4.40.1 * sssd-common-32bit-2.5.2-150400.4.40.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.40.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11561.html * https://bugzilla.suse.com/show_bug.cgi?id=1244325 * https://bugzilla.suse.com/show_bug.cgi?id=1251827 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 24 08:30:38 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 24 Nov 2025 08:30:38 -0000 Subject: SUSE-RU-2025:4179-1: moderate: Recommended update for mozilla-nspr Message-ID: <176397303818.22596.16928596150938172592@smelt2.prg2.suse.org> # Recommended update for mozilla-nspr Announcement ID: SUSE-RU-2025:4179-1 Release Date: 2025-11-24T07:28:57Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that can now be installed. ## Description: This update for mozilla-nspr fixes the following issues: * update to NSPR 4.36.2 * Fixed a syntax error in test file parsetm.c, which was introduced in 4.36.1 * update to NSPR 4.36.1 * Incorrect time value produced by PR_ParseTimeString and PR_ParseTimeStringToExplodedTime if input string doesn't specify seconds. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4179=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4179=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4179=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4179=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4179=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4179=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4179=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4179=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4179=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4179=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4179=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4179=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4179=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4179=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4179=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4179=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4179=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4179=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4179=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4179=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4179=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4179=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4179=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4179=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4179=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * Basesystem Module 15-SP6 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * Basesystem Module 15-SP7 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Manager Server 4.3 LTS (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-devel-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Enterprise Storage 7.1 (x86_64) * mozilla-nspr-32bit-4.36.2-150000.3.36.1 * mozilla-nspr-32bit-debuginfo-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * mozilla-nspr-debugsource-4.36.2-150000.3.36.1 * mozilla-nspr-debuginfo-4.36.2-150000.3.36.1 * mozilla-nspr-4.36.2-150000.3.36.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 24 12:33:01 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 24 Nov 2025 12:33:01 -0000 Subject: SUSE-RU-2025:4192-1: important: Recommended update for smartmontools Message-ID: <176398758142.17407.12216878177346697283@smelt2.prg2.suse.org> # Recommended update for smartmontools Announcement ID: SUSE-RU-2025:4192-1 Release Date: 2025-11-24T09:35:48Z Rating: important References: * bsc#1167051 * bsc#1181400 * bsc#1207461 * bsc#990406 * jsc#PED-13806 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that contains one feature and has four fixes can now be installed. ## Description: This update for smartmontools fixes the following issues: * update-smart-drivedb: Provide support for the new upstream GitHub repository. * update-smart-drivedb: Do not overwrite files in /usr/share. * Use /var/lib provided by --with-drivedbinstdir. * Add smartmontools-drivedb.h version 5894 from the branch 7.5. * Update to 7.5 (jsc#PED-13806). * Do not quit with an error when no drives to monitor are available (bsc#990406 bsc#1167051). * Run through spec-cleaner, use autosetup * smartmontools.generate_smartd_opts.in: Fix generated options when SMARTD_SAVESTATES or SMARTD_ATTRLOG are set to "no" (bsc#1207461). * Catch another invalid state in %post: DRIVEDB_H_RELEASE_SAVED might end up empty * refresh keyring with new signing key * Remove smartmontools-drivedb.h. Up to date version is included in release tarball * packaging: try to fix smartmontools-drivedb_h-update.sh * Added hardening to systemd service(s) (bsc#1181400). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4192=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4192=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4192=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4192=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4192=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4192=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4192=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4192=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4192=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4192=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4192=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4192=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4192=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4192=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4192=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4192=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * smartmontools-7.5-150300.8.11.1 * smartmontools-debugsource-7.5-150300.8.11.1 * smartmontools-debuginfo-7.5-150300.8.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1167051 * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1207461 * https://bugzilla.suse.com/show_bug.cgi?id=990406 * https://jira.suse.com/browse/PED-13806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 24 12:33:59 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 24 Nov 2025 12:33:59 -0000 Subject: SUSE-SU-2025:4092-1: moderate: Security update for elfutils Message-ID: <176398763940.17407.7571315684770649100@smelt2.prg2.suse.org> # Security update for elfutils Announcement ID: SUSE-SU-2025:4092-1 Release Date: 2025-11-24T09:09:10Z Rating: moderate References: * bsc#1237236 * bsc#1237240 * bsc#1237241 * bsc#1237242 Cross-References: * CVE-2025-1352 * CVE-2025-1372 * CVE-2025-1376 * CVE-2025-1377 CVSS scores: * CVE-2025-1352 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1352 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1352 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1352 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1352 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1372 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1372 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1372 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1372 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-1372 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-1376 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1376 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1376 ( NVD ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1376 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1376 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1377 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1377 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1377 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1377 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1377 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves four vulnerabilities can now be installed. ## Description: This update for elfutils fixes the following issues: * Fixing build/testsuite for more recent glibc and kernels. * Fixing denial of service and general buffer overflow errors (bsc#1237236, bsc#1237240, bsc#1237241, bsc#1237242): * CVE-2025-1376: Fixed denial of service in function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip * CVE-2025-1377: Fixed denial of service in function gelf_getsymshndx of the file strip.c of the component eu-strip * CVE-2025-1372: Fixed buffer overflow in function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf * CVE-2025-1352: Fixed SEGV (illegal read access) in function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf * Fixing testsuite race conditions in run-debuginfod-find.sh. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4092=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4092=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4092=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4092=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4092=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4092=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4092=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4092=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4092=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4092=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4092=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4092=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4092=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4092=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4092=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4092=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4092=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4092=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Manager Proxy 4.3 LTS (x86_64) * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * SUSE Manager Proxy 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Manager Server 4.3 LTS (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libdw-devel-0.185-150400.5.8.3 * libdebuginfod-dummy-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * debuginfod-dummy-client-debuginfo-0.185-150400.5.8.3 * debuginfod-dummy-client-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-dummy-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libdebuginfod1-dummy-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * openSUSE Leap 15.4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * openSUSE Leap 15.4 (x86_64) * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-0.185-150400.5.8.3 * libelf-devel-32bit-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libasm1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * openSUSE Leap 15.4 (aarch64_ilp32) * libasm1-64bit-debuginfo-0.185-150400.5.8.3 * libdw1-64bit-debuginfo-0.185-150400.5.8.3 * libasm1-64bit-0.185-150400.5.8.3 * libelf1-64bit-debuginfo-0.185-150400.5.8.3 * libelf-devel-64bit-0.185-150400.5.8.3 * libdw1-64bit-0.185-150400.5.8.3 * libelf1-64bit-0.185-150400.5.8.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libdw-devel-0.185-150400.5.8.3 * libdebuginfod-dummy-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * debuginfod-dummy-client-debuginfo-0.185-150400.5.8.3 * debuginfod-dummy-client-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * libelf1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-dummy-debuginfo-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libdebuginfod1-dummy-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * openSUSE Leap 15.6 (noarch) * elfutils-lang-0.185-150400.5.8.3 * openSUSE Leap 15.6 (x86_64) * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * libasm1-32bit-0.185-150400.5.8.3 * libelf-devel-32bit-0.185-150400.5.8.3 * libelf1-32bit-0.185-150400.5.8.3 * libasm1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libelf1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * libasm1-debuginfo-0.185-150400.5.8.3 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (noarch) * elfutils-lang-0.185-150400.5.8.3 * Basesystem Module 15-SP6 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (noarch) * elfutils-lang-0.185-150400.5.8.3 * Basesystem Module 15-SP7 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * libdebuginfod-devel-0.185-150400.5.8.2 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libelf1-0.185-150400.5.8.3 * libasm-devel-0.185-150400.5.8.3 * elfutils-debuginfod-0.185-150400.5.8.2 * elfutils-debuginfod-debugsource-0.185-150400.5.8.2 * libdw-devel-0.185-150400.5.8.3 * libdebuginfod1-debuginfo-0.185-150400.5.8.2 * elfutils-0.185-150400.5.8.3 * libasm1-0.185-150400.5.8.3 * libdebuginfod1-0.185-150400.5.8.2 * libelf-devel-0.185-150400.5.8.3 * libelf1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-0.185-150400.5.8.2 * elfutils-debuginfod-debuginfo-0.185-150400.5.8.2 * libasm1-debuginfo-0.185-150400.5.8.3 * debuginfod-client-debuginfo-0.185-150400.5.8.2 * elfutils-debugsource-0.185-150400.5.8.3 * libdw1-0.185-150400.5.8.3 * libdw1-debuginfo-0.185-150400.5.8.3 * elfutils-debuginfo-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * elfutils-lang-0.185-150400.5.8.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libelf1-32bit-0.185-150400.5.8.3 * libdw1-32bit-debuginfo-0.185-150400.5.8.3 * libdw1-32bit-0.185-150400.5.8.3 * libelf1-32bit-debuginfo-0.185-150400.5.8.3 ## References: * https://www.suse.com/security/cve/CVE-2025-1352.html * https://www.suse.com/security/cve/CVE-2025-1372.html * https://www.suse.com/security/cve/CVE-2025-1376.html * https://www.suse.com/security/cve/CVE-2025-1377.html * https://bugzilla.suse.com/show_bug.cgi?id=1237236 * https://bugzilla.suse.com/show_bug.cgi?id=1237240 * https://bugzilla.suse.com/show_bug.cgi?id=1237241 * https://bugzilla.suse.com/show_bug.cgi?id=1237242 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 25 12:30:26 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 25 Nov 2025 12:30:26 -0000 Subject: SUSE-SU-2025:4222-1: important: Security update for bind Message-ID: <176407382601.25740.11771022900405046187@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4222-1 Release Date: 2025-11-25T08:54:07Z Rating: important References: * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-4222=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-4222=1 ## Package List: * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 (aarch64 ppc64le s390x x86_64) * libisc1606-9.16.6-150000.12.85.1 * libbind9-1600-debuginfo-9.16.6-150000.12.85.1 * libisccc1600-debuginfo-9.16.6-150000.12.85.1 * bind-debugsource-9.16.6-150000.12.85.1 * libisccfg1600-9.16.6-150000.12.85.1 * libns1604-debuginfo-9.16.6-150000.12.85.1 * libirs1601-9.16.6-150000.12.85.1 * libisc1606-debuginfo-9.16.6-150000.12.85.1 * libirs1601-debuginfo-9.16.6-150000.12.85.1 * libisccfg1600-debuginfo-9.16.6-150000.12.85.1 * libns1604-9.16.6-150000.12.85.1 * bind-utils-9.16.6-150000.12.85.1 * libdns1605-debuginfo-9.16.6-150000.12.85.1 * bind-debuginfo-9.16.6-150000.12.85.1 * libisccc1600-9.16.6-150000.12.85.1 * libbind9-1600-9.16.6-150000.12.85.1 * libdns1605-9.16.6-150000.12.85.1 * bind-utils-debuginfo-9.16.6-150000.12.85.1 * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 (noarch) * python3-bind-9.16.6-150000.12.85.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * libisc1606-9.16.6-150000.12.85.1 * libisccfg1600-9.16.6-150000.12.85.1 * libns1604-debuginfo-9.16.6-150000.12.85.1 * libirs1601-9.16.6-150000.12.85.1 * libns1604-9.16.6-150000.12.85.1 * bind-utils-9.16.6-150000.12.85.1 * libisccc1600-9.16.6-150000.12.85.1 * libbind9-1600-9.16.6-150000.12.85.1 * libdns1605-9.16.6-150000.12.85.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64_ilp32) * libisc1606-64bit-9.16.6-150000.12.85.1 * libirs1601-64bit-9.16.6-150000.12.85.1 * libisccc1600-64bit-9.16.6-150000.12.85.1 * libbind9-1600-64bit-9.16.6-150000.12.85.1 * libisccfg1600-64bit-9.16.6-150000.12.85.1 * libdns1605-64bit-9.16.6-150000.12.85.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * python3-bind-9.16.6-150000.12.85.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 28 18:32:42 2025 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 28 Nov 2025 18:32:42 -0000 Subject: SUSE-RU-2025:4304-1: important: Recommended update for tomcat Message-ID: <176435476274.30077.7825273286252640679@smelt2.prg2.suse.org> # Recommended update for tomcat Announcement ID: SUSE-RU-2025:4304-1 Release Date: 2025-11-28T13:17:58Z Rating: important References: * bsc#1253460 Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * Web and Scripting Module 15-SP6 * Web and Scripting Module 15-SP7 An update that has one fix can now be installed. ## Description: This update for tomcat fixes the following issues: * make catalina.sh %config(noreplace) (bsc#1253460) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4304=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4304=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4304=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4304=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4304=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4304=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-4304=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-4304=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4304=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4304=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4304=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4304=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4304=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4304=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4304=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4304=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Manager Server 4.3 LTS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Enterprise Storage 7.1 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * openSUSE Leap 15.6 (noarch) * tomcat-javadoc-9.0.111-150200.99.1 * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsvc-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * tomcat-docs-webapp-9.0.111-150200.99.1 * tomcat-embed-9.0.111-150200.99.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * Web and Scripting Module 15-SP7 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat-servlet-4_0-api-9.0.111-150200.99.1 * tomcat-9.0.111-150200.99.1 * tomcat-lib-9.0.111-150200.99.1 * tomcat-webapps-9.0.111-150200.99.1 * tomcat-admin-webapps-9.0.111-150200.99.1 * tomcat-jsp-2_3-api-9.0.111-150200.99.1 * tomcat-el-3_0-api-9.0.111-150200.99.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253460 -------------- next part -------------- An HTML attachment was scrubbed... URL: