openSUSE-SU-2025:15420-1: moderate: go1.25-1.25rc3-1.1 on GA media
SUSE-SU-2025:02734-1: moderate: Security update for dpkg
SUSE-SU-2025:02737-1: low: Security update for libsoup
SUSE-SU-2025:02735-1: moderate: Security update for python-urllib3
SUSE-SU-2025:02733-1: moderate: Security update for nginx
SUSE-SU-2025:02739-1: moderate: Security update for ruby2.5
SUSE-SU-2025:02740-1: moderate: Security update for tgt
openSUSE-SU-2025:15420-1: moderate: go1.25-1.25rc3-1.1 on GA media
# go1.25-1.25rc3-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15420-1
Rating: moderate
Cross-References:
* CVE-2025-47906
* CVE-2025-47907
CVSS scores:
* CVE-2025-47906 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-47906 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-47907 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2025-47907 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the go1.25-1.25rc3-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* go1.25 1.25rc3-1.1
* go1.25-doc 1.25rc3-1.1
* go1.25-libstd 1.25rc3-1.1
* go1.25-race 1.25rc3-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-47906.html
* https://www.suse.com/security/cve/CVE-2025-47907.html
SUSE-SU-2025:02734-1: moderate: Security update for dpkg
# Security update for dpkg
Announcement ID: SUSE-SU-2025:02734-1
Release Date: 2025-08-08T08:05:56Z
Rating: moderate
References:
* bsc#1245573
Cross-References:
* CVE-2025-6297
CVSS scores:
* CVE-2025-6297 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-6297 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* Development Tools Module 15-SP6
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for dpkg fixes the following issues:
* CVE-2025-6297: Fixed an improper sanitization of directory permissions that
could lead to DoS. (bsc#1245573)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2734=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2734=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2734=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2734=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2734=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2734=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2734=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2734=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2734=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2734=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2734=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2734=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2734=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* openSUSE Leap 15.6 (noarch)
* dpkg-lang-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
## References:
* https://www.suse.com/security/cve/CVE-2025-6297.html
* https://bugzilla.suse.com/show_bug.cgi?id=1245573
SUSE-SU-2025:02737-1: low: Security update for libsoup
# Security update for libsoup
Announcement ID: SUSE-SU-2025:02737-1
Release Date: 2025-08-08T08:06:35Z
Rating: low
References:
* bsc#1243314
Cross-References:
* CVE-2025-4945
CVSS scores:
* CVE-2025-4945 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-4945 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-4945 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
An update that solves one vulnerability can now be installed.
## Description:
This update for libsoup fixes the following issues:
* CVE-2025-4945: Add value checks for date/time parsing (bsc#1243314).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2737=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-devel-3.0.4-150400.3.13.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.13.1
* libsoup-debugsource-3.0.4-150400.3.13.1
* libsoup-3_0-0-3.0.4-150400.3.13.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-3.0.4-150400.3.13.1
* libsoup-devel-32bit-3.0.4-150400.3.13.1
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.13.1
* libsoup-devel-64bit-3.0.4-150400.3.13.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.13.1
## References:
* https://www.suse.com/security/cve/CVE-2025-4945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243314
SUSE-SU-2025:02735-1: moderate: Security update for python-urllib3
# Security update for python-urllib3
Announcement ID: SUSE-SU-2025:02735-1
Release Date: 2025-08-08T08:06:18Z
Rating: moderate
References:
* bsc#1244925
Cross-References:
* CVE-2025-50181
CVSS scores:
* CVE-2025-50181 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-50181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-50181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-urllib3 fixes the following issues:
* CVE-2025-50181: Pool managers now properly control redirects when retries is
passed. (bsc#1244925)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2735=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2735=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2735=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2735=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-2735=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* openSUSE Leap 15.6 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Public Cloud Module 15-SP4 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Python 3 Module 15-SP6 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Python 3 Module 15-SP7 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
## References:
* https://www.suse.com/security/cve/CVE-2025-50181.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244925
SUSE-SU-2025:02733-1: moderate: Security update for nginx
# Security update for nginx
Announcement ID: SUSE-SU-2025:02733-1
Release Date: 2025-08-08T08:04:13Z
Rating: moderate
References:
* bsc#1246090
Affected Products:
* openSUSE Leap 15.4
An update that has one security fix can now be installed.
## Description:
This update for nginx fixes the following issues:
Security hardening: \- Drop root priviledges while running logrotatei.
(bsc#1246090)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2733=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* nginx-1.21.5-150400.3.9.1
* nginx-debugsource-1.21.5-150400.3.9.1
* nginx-debuginfo-1.21.5-150400.3.9.1
* openSUSE Leap 15.4 (noarch)
* nginx-source-1.21.5-150400.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1246090
SUSE-SU-2025:02739-1: moderate: Security update for ruby2.5
# Security update for ruby2.5
Announcement ID: SUSE-SU-2025:02739-1
Release Date: 2025-08-08T09:11:30Z
Rating: moderate
References:
* bsc#1237805
* bsc#1245254
Cross-References:
* CVE-2025-27221
* CVE-2025-6442
CVSS scores:
* CVE-2025-27221 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27221 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-27221 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2025-27221 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-6442 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-6442 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for ruby2.5 fixes the following issues:
* CVE-2025-6442: Fixed read_header HTTP Request Smuggling Vulnerability in
WEBrick (bsc#1245254)
* CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+
(bsc#1237805)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2739=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2739=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libruby2_5-2_5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-2.5.9-150000.4.46.1
* ruby2.5-2.5.9-150000.4.46.1
* ruby2.5-devel-2.5.9-150000.4.46.1
* ruby2.5-devel-extra-2.5.9-150000.4.46.1
* ruby2.5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-doc-2.5.9-150000.4.46.1
* ruby2.5-stdlib-debuginfo-2.5.9-150000.4.46.1
* libruby2_5-2_5-2.5.9-150000.4.46.1
* ruby2.5-debugsource-2.5.9-150000.4.46.1
* openSUSE Leap 15.6 (noarch)
* ruby2.5-doc-ri-2.5.9-150000.4.46.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libruby2_5-2_5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-2.5.9-150000.4.46.1
* ruby2.5-2.5.9-150000.4.46.1
* ruby2.5-devel-2.5.9-150000.4.46.1
* ruby2.5-devel-extra-2.5.9-150000.4.46.1
* ruby2.5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-debuginfo-2.5.9-150000.4.46.1
* libruby2_5-2_5-2.5.9-150000.4.46.1
* ruby2.5-debugsource-2.5.9-150000.4.46.1
## References:
* https://www.suse.com/security/cve/CVE-2025-27221.html
* https://www.suse.com/security/cve/CVE-2025-6442.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237805
* https://bugzilla.suse.com/show_bug.cgi?id=1245254
SUSE-SU-2025:02740-1: moderate: Security update for tgt
# Security update for tgt
Announcement ID: SUSE-SU-2025:02740-1
Release Date: 2025-08-08T09:12:01Z
Rating: moderate
References:
* bsc#1230360
Cross-References:
* CVE-2024-45751
CVSS scores:
* CVE-2024-45751 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-45751 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for tgt fixes the following issues:
* CVE-2024-45751: Fixed CHAP authentication bypass in user-space Linux target
framework (bsc#1230360)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2740=1 openSUSE-SLE-15.6-2025-2740=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2740=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2740=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45751.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230360