SUSE 5495 Published by

SUSE Linux has received several security updates, including updates for go, dpkg, libsoup, python-urllib3, nginx, ruby2.5, and tgt:

openSUSE-SU-2025:15420-1: moderate: go1.25-1.25rc3-1.1 on GA media
SUSE-SU-2025:02734-1: moderate: Security update for dpkg
SUSE-SU-2025:02737-1: low: Security update for libsoup
SUSE-SU-2025:02735-1: moderate: Security update for python-urllib3
SUSE-SU-2025:02733-1: moderate: Security update for nginx
SUSE-SU-2025:02739-1: moderate: Security update for ruby2.5
SUSE-SU-2025:02740-1: moderate: Security update for tgt




openSUSE-SU-2025:15420-1: moderate: go1.25-1.25rc3-1.1 on GA media


# go1.25-1.25rc3-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15420-1
Rating: moderate

Cross-References:

* CVE-2025-47906
* CVE-2025-47907

CVSS scores:

* CVE-2025-47906 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-47906 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-47907 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2025-47907 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the go1.25-1.25rc3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* go1.25 1.25rc3-1.1
* go1.25-doc 1.25rc3-1.1
* go1.25-libstd 1.25rc3-1.1
* go1.25-race 1.25rc3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-47906.html
* https://www.suse.com/security/cve/CVE-2025-47907.html



SUSE-SU-2025:02734-1: moderate: Security update for dpkg


# Security update for dpkg

Announcement ID: SUSE-SU-2025:02734-1
Release Date: 2025-08-08T08:05:56Z
Rating: moderate
References:

* bsc#1245573

Cross-References:

* CVE-2025-6297

CVSS scores:

* CVE-2025-6297 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-6297 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* Development Tools Module 15-SP6
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for dpkg fixes the following issues:

* CVE-2025-6297: Fixed an improper sanitization of directory permissions that
could lead to DoS. (bsc#1245573)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2734=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2734=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2734=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2734=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2734=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2734=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2734=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2734=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2734=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2734=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2734=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2734=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2734=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* openSUSE Leap 15.6 (noarch)
* dpkg-lang-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* dpkg-debuginfo-1.19.0.4-150000.4.7.1
* dpkg-debugsource-1.19.0.4-150000.4.7.1
* dpkg-1.19.0.4-150000.4.7.1
* dpkg-devel-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* update-alternatives-debugsource-1.19.0.4-150000.4.7.1
* update-alternatives-debuginfo-1.19.0.4-150000.4.7.1
* update-alternatives-1.19.0.4-150000.4.7.1

## References:

* https://www.suse.com/security/cve/CVE-2025-6297.html
* https://bugzilla.suse.com/show_bug.cgi?id=1245573



SUSE-SU-2025:02737-1: low: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2025:02737-1
Release Date: 2025-08-08T08:06:35Z
Rating: low
References:

* bsc#1243314

Cross-References:

* CVE-2025-4945

CVSS scores:

* CVE-2025-4945 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-4945 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-4945 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.4

An update that solves one vulnerability can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2025-4945: Add value checks for date/time parsing (bsc#1243314).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2737=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-devel-3.0.4-150400.3.13.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.13.1
* libsoup-debugsource-3.0.4-150400.3.13.1
* libsoup-3_0-0-3.0.4-150400.3.13.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-3.0.4-150400.3.13.1
* libsoup-devel-32bit-3.0.4-150400.3.13.1
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.13.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.13.1
* libsoup-devel-64bit-3.0.4-150400.3.13.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.13.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243314



SUSE-SU-2025:02735-1: moderate: Security update for python-urllib3


# Security update for python-urllib3

Announcement ID: SUSE-SU-2025:02735-1
Release Date: 2025-08-08T08:06:18Z
Rating: moderate
References:

* bsc#1244925

Cross-References:

* CVE-2025-50181

CVSS scores:

* CVE-2025-50181 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-50181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-50181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-urllib3 fixes the following issues:

* CVE-2025-50181: Pool managers now properly control redirects when retries is
passed. (bsc#1244925)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2735=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2735=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2735=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2735=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-2735=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* openSUSE Leap 15.6 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Public Cloud Module 15-SP4 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Python 3 Module 15-SP6 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1
* Python 3 Module 15-SP7 (noarch)
* python311-urllib3-2.0.7-150400.7.21.1

## References:

* https://www.suse.com/security/cve/CVE-2025-50181.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244925



SUSE-SU-2025:02733-1: moderate: Security update for nginx


# Security update for nginx

Announcement ID: SUSE-SU-2025:02733-1
Release Date: 2025-08-08T08:04:13Z
Rating: moderate
References:

* bsc#1246090

Affected Products:

* openSUSE Leap 15.4

An update that has one security fix can now be installed.

## Description:

This update for nginx fixes the following issues:

Security hardening: \- Drop root priviledges while running logrotatei.
(bsc#1246090)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2733=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* nginx-1.21.5-150400.3.9.1
* nginx-debugsource-1.21.5-150400.3.9.1
* nginx-debuginfo-1.21.5-150400.3.9.1
* openSUSE Leap 15.4 (noarch)
* nginx-source-1.21.5-150400.3.9.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1246090



SUSE-SU-2025:02739-1: moderate: Security update for ruby2.5


# Security update for ruby2.5

Announcement ID: SUSE-SU-2025:02739-1
Release Date: 2025-08-08T09:11:30Z
Rating: moderate
References:

* bsc#1237805
* bsc#1245254

Cross-References:

* CVE-2025-27221
* CVE-2025-6442

CVSS scores:

* CVE-2025-27221 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27221 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-27221 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
* CVE-2025-27221 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-6442 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-6442 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for ruby2.5 fixes the following issues:

* CVE-2025-6442: Fixed read_header HTTP Request Smuggling Vulnerability in
WEBrick (bsc#1245254)
* CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+
(bsc#1237805)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2739=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2739=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libruby2_5-2_5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-2.5.9-150000.4.46.1
* ruby2.5-2.5.9-150000.4.46.1
* ruby2.5-devel-2.5.9-150000.4.46.1
* ruby2.5-devel-extra-2.5.9-150000.4.46.1
* ruby2.5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-doc-2.5.9-150000.4.46.1
* ruby2.5-stdlib-debuginfo-2.5.9-150000.4.46.1
* libruby2_5-2_5-2.5.9-150000.4.46.1
* ruby2.5-debugsource-2.5.9-150000.4.46.1
* openSUSE Leap 15.6 (noarch)
* ruby2.5-doc-ri-2.5.9-150000.4.46.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libruby2_5-2_5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-2.5.9-150000.4.46.1
* ruby2.5-2.5.9-150000.4.46.1
* ruby2.5-devel-2.5.9-150000.4.46.1
* ruby2.5-devel-extra-2.5.9-150000.4.46.1
* ruby2.5-debuginfo-2.5.9-150000.4.46.1
* ruby2.5-stdlib-debuginfo-2.5.9-150000.4.46.1
* libruby2_5-2_5-2.5.9-150000.4.46.1
* ruby2.5-debugsource-2.5.9-150000.4.46.1

## References:

* https://www.suse.com/security/cve/CVE-2025-27221.html
* https://www.suse.com/security/cve/CVE-2025-6442.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237805
* https://bugzilla.suse.com/show_bug.cgi?id=1245254



SUSE-SU-2025:02740-1: moderate: Security update for tgt


# Security update for tgt

Announcement ID: SUSE-SU-2025:02740-1
Release Date: 2025-08-08T09:12:01Z
Rating: moderate
References:

* bsc#1230360

Cross-References:

* CVE-2024-45751

CVSS scores:

* CVE-2024-45751 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-45751 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for tgt fixes the following issues:

* CVE-2024-45751: Fixed CHAP authentication bypass in user-space Linux target
framework (bsc#1230360)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2740=1 openSUSE-SLE-15.6-2025-2740=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2740=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2740=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* tgt-debugsource-1.0.85-150600.10.3.1
* tgt-1.0.85-150600.10.3.1
* tgt-debuginfo-1.0.85-150600.10.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-45751.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230360