SUSE-SU-2025:1565-1: moderate: Security update for open-vm-tools
openSUSE-SU-2025:15091-1: moderate: openssh-10.0p2-2.1 on GA media
openSUSE-SU-2025:15089-1: moderate: iputils-20240905-3.1 on GA media
SUSE-SU-2025:1566-1: important: Security update for valkey
SUSE-SU-2025:1568-1: moderate: Security update for libraw
SUSE-SU-2025:1570-1: low: Security update for cargo-c
SUSE-SU-2025:1571-1: moderate: Security update for gimp
SUSE-SU-2025:1572-1: moderate: Security update for libraw
openSUSE-SU-2025:15092-1: moderate: pnpm-10.11.0-1.1 on GA media
openSUSE-SU-2025:15093-1: moderate: ucode-intel-20250512-1.1 on GA media
SUSE-SU-2025:1565-1: moderate: Security update for open-vm-tools
# Security update for open-vm-tools
Announcement ID: SUSE-SU-2025:1565-1
Release Date: 2025-05-16T11:05:16Z
Rating: moderate
References:
* bsc#1237147
* bsc#1241938
* bsc#1243106
Cross-References:
* CVE-2025-22247
CVSS scores:
* CVE-2025-22247 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-22247 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-22247 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Affected Products:
* Basesystem Module 15-SP6
* Containers Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for open-vm-tools fixes the following issues:
Update to 12.5.2:
Security fixes:
* CVE-2025-22247: Fixed Insecure file handling (bsc#1243106)
Other fixes:
* Fixed GCC 15 compile time error (bsc#1241938)
* Fix building with containerd 1.7.25+ (bsc#1237147)
Full changelog:
https://github.com/vmware/open-vm-tools/blob/stable-12.5.2/ReleaseNotes.md
https://github.com/vmware/open-vm-tools/blob/stable-12.5.2/open-vm-
tools/ChangeLog
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1565=1 openSUSE-SLE-15.6-2025-1565=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1565=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1565=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1565=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* libvmtools0-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-containerinfo-12.5.2-150600.3.12.1
* open-vm-tools-desktop-12.5.2-150600.3.12.1
* open-vm-tools-12.5.2-150600.3.12.1
* open-vm-tools-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-desktop-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-sdmp-12.5.2-150600.3.12.1
* open-vm-tools-sdmp-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-containerinfo-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-debugsource-12.5.2-150600.3.12.1
* libvmtools-devel-12.5.2-150600.3.12.1
* libvmtools0-12.5.2-150600.3.12.1
* openSUSE Leap 15.6 (x86_64)
* open-vm-tools-salt-minion-12.5.2-150600.3.12.1
* Basesystem Module 15-SP6 (aarch64 x86_64)
* libvmtools0-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-12.5.2-150600.3.12.1
* open-vm-tools-sdmp-12.5.2-150600.3.12.1
* open-vm-tools-sdmp-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-debugsource-12.5.2-150600.3.12.1
* libvmtools0-12.5.2-150600.3.12.1
* Basesystem Module 15-SP6 (x86_64)
* open-vm-tools-salt-minion-12.5.2-150600.3.12.1
* libvmtools-devel-12.5.2-150600.3.12.1
* Containers Module 15-SP6 (aarch64 x86_64)
* open-vm-tools-containerinfo-12.5.2-150600.3.12.1
* open-vm-tools-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-debugsource-12.5.2-150600.3.12.1
* open-vm-tools-containerinfo-debuginfo-12.5.2-150600.3.12.1
* Desktop Applications Module 15-SP6 (aarch64 x86_64)
* open-vm-tools-desktop-12.5.2-150600.3.12.1
* open-vm-tools-debugsource-12.5.2-150600.3.12.1
* open-vm-tools-debuginfo-12.5.2-150600.3.12.1
* open-vm-tools-desktop-debuginfo-12.5.2-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2025-22247.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237147
* https://bugzilla.suse.com/show_bug.cgi?id=1241938
* https://bugzilla.suse.com/show_bug.cgi?id=1243106
openSUSE-SU-2025:15091-1: moderate: openssh-10.0p2-2.1 on GA media
# openssh-10.0p2-2.1 on GA media
Announcement ID: openSUSE-SU-2025:15091-1
Rating: moderate
Cross-References:
* CVE-2025-32728
CVSS scores:
* CVE-2025-32728 ( SUSE ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-32728 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the openssh-10.0p2-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* openssh 10.0p2-2.1
* openssh-cavs 10.0p2-2.1
* openssh-clients 10.0p2-2.1
* openssh-common 10.0p2-2.1
* openssh-helpers 10.0p2-2.1
* openssh-server 10.0p2-2.1
* openssh-server-config-rootlogin 10.0p2-2.1
## References:
* https://www.suse.com/security/cve/CVE-2025-32728.html
openSUSE-SU-2025:15089-1: moderate: iputils-20240905-3.1 on GA media
# iputils-20240905-3.1 on GA media
Announcement ID: openSUSE-SU-2025:15089-1
Rating: moderate
Cross-References:
* CVE-2025-47268
CVSS scores:
* CVE-2025-47268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-47268 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the iputils-20240905-3.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* iputils 20240905-3.1
## References:
* https://www.suse.com/security/cve/CVE-2025-47268.html
SUSE-SU-2025:1566-1: important: Security update for valkey
# Security update for valkey
Announcement ID: SUSE-SU-2025:1566-1
Release Date: 2025-05-16T12:02:19Z
Rating: important
References:
* bsc#1241708
Cross-References:
* CVE-2025-21605
CVSS scores:
* CVE-2025-21605 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21605 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21605 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for valkey fixes the following issues:
* CVE-2025-21605: Fixed output buffer denial of service (bsc#1241708)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1566=1 openSUSE-SLE-15.6-2025-1566=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1566=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* valkey-debugsource-8.0.2-150600.13.6.1
* valkey-devel-8.0.2-150600.13.6.1
* valkey-8.0.2-150600.13.6.1
* valkey-debuginfo-8.0.2-150600.13.6.1
* openSUSE Leap 15.6 (noarch)
* valkey-compat-redis-8.0.2-150600.13.6.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* valkey-debugsource-8.0.2-150600.13.6.1
* valkey-devel-8.0.2-150600.13.6.1
* valkey-8.0.2-150600.13.6.1
* valkey-debuginfo-8.0.2-150600.13.6.1
* Server Applications Module 15-SP6 (noarch)
* valkey-compat-redis-8.0.2-150600.13.6.1
## References:
* https://www.suse.com/security/cve/CVE-2025-21605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241708
SUSE-SU-2025:1568-1: moderate: Security update for libraw
# Security update for libraw
Announcement ID: SUSE-SU-2025:1568-1
Release Date: 2025-05-16T13:42:53Z
Rating: moderate
References:
* bsc#1241584
* bsc#1241585
* bsc#1241642
* bsc#1241643
Cross-References:
* CVE-2025-43961
* CVE-2025-43962
* CVE-2025-43963
* CVE-2025-43964
CVSS scores:
* CVE-2025-43961 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43961 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43961 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43961 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43962 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43962 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-43962 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43962 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43963 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43963 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43963 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43964 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43964 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-43964 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43964 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for libraw fixes the following issues:
* CVE-2025-43961: Fixed out-of-bounds read in the Fujifilm 0xf00c tag parser
in metadata/tiff.cpp (bsc#1241643)
* CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in
phase_one_correct function (bsc#1241585)
* CVE-2025-43963: Fixed out-of-buffer access during phase_one_correct in
decoders/load_mfbacks.cpp (bsc#1241642)
* CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct does not
enforce minimum w0 and w1 values (bsc#1241584)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-1568=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libraw-tools-0.20.2-150400.3.16.1
* libraw-devel-static-0.20.2-150400.3.16.1
* libraw20-0.20.2-150400.3.16.1
* libraw-debugsource-0.20.2-150400.3.16.1
* libraw-tools-debuginfo-0.20.2-150400.3.16.1
* libraw-devel-0.20.2-150400.3.16.1
* libraw20-debuginfo-0.20.2-150400.3.16.1
* openSUSE Leap 15.4 (x86_64)
* libraw20-32bit-debuginfo-0.20.2-150400.3.16.1
* libraw20-32bit-0.20.2-150400.3.16.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libraw20-64bit-debuginfo-0.20.2-150400.3.16.1
* libraw20-64bit-0.20.2-150400.3.16.1
## References:
* https://www.suse.com/security/cve/CVE-2025-43961.html
* https://www.suse.com/security/cve/CVE-2025-43962.html
* https://www.suse.com/security/cve/CVE-2025-43963.html
* https://www.suse.com/security/cve/CVE-2025-43964.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241584
* https://bugzilla.suse.com/show_bug.cgi?id=1241585
* https://bugzilla.suse.com/show_bug.cgi?id=1241642
* https://bugzilla.suse.com/show_bug.cgi?id=1241643
SUSE-SU-2025:1570-1: low: Security update for cargo-c
# Security update for cargo-c
Announcement ID: SUSE-SU-2025:1570-1
Release Date: 2025-05-16T13:44:06Z
Rating: low
References:
* bsc#1242675
Cross-References:
* CVE-2025-3416
CVSS scores:
* CVE-2025-3416 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for cargo-c fixes the following issues:
* CVE-2025-3416: use-after-free in Md::fetch and Cipher::fetch of rust-openssl
crate (bsc#1242675).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1570=1 openSUSE-SLE-15.6-2025-1570=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* cargo-c-0.10.3~git0.ee7d7ef-150600.3.6.1
* cargo-c-debuginfo-0.10.3~git0.ee7d7ef-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2025-3416.html
* https://bugzilla.suse.com/show_bug.cgi?id=1242675
SUSE-SU-2025:1571-1: moderate: Security update for gimp
# Security update for gimp
Announcement ID: SUSE-SU-2025:1571-1
Release Date: 2025-05-16T13:49:04Z
Rating: moderate
References:
* bsc#1241691
Cross-References:
* CVE-2025-2761
CVSS scores:
* CVE-2025-2761 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2025-2761 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for gimp fixes the following issues:
* CVE-2025-2761: unvalidated user input in FLI file parsing may lead to an
out-of-bounds write (bsc#1241691).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-1571=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1571=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1571=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1571=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libgimpui-2_0-0-2.10.30-150400.3.14.1
* gimp-devel-2.10.30-150400.3.14.1
* gimp-2.10.30-150400.3.14.1
* libgimp-2_0-0-2.10.30-150400.3.14.1
* gimp-plugin-aa-2.10.30-150400.3.14.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debuginfo-2.10.30-150400.3.14.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debugsource-2.10.30-150400.3.14.1
* gimp-devel-debuginfo-2.10.30-150400.3.14.1
* openSUSE Leap 15.4 (noarch)
* gimp-lang-2.10.30-150400.3.14.1
* openSUSE Leap 15.4 (x86_64)
* libgimp-2_0-0-32bit-2.10.30-150400.3.14.1
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.14.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.14.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-64bit-2.10.30-150400.3.14.1
* libgimp-2_0-0-64bit-2.10.30-150400.3.14.1
* libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.14.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libgimpui-2_0-0-2.10.30-150400.3.14.1
* gimp-devel-2.10.30-150400.3.14.1
* gimp-2.10.30-150400.3.14.1
* libgimp-2_0-0-2.10.30-150400.3.14.1
* gimp-plugin-aa-2.10.30-150400.3.14.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debuginfo-2.10.30-150400.3.14.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debugsource-2.10.30-150400.3.14.1
* gimp-devel-debuginfo-2.10.30-150400.3.14.1
* openSUSE Leap 15.6 (noarch)
* gimp-lang-2.10.30-150400.3.14.1
* openSUSE Leap 15.6 (x86_64)
* libgimp-2_0-0-32bit-2.10.30-150400.3.14.1
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.14.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.14.1
* SUSE Package Hub 15 15-SP6 (aarch64)
* gimp-devel-2.10.30-150400.3.14.1
* gimp-2.10.30-150400.3.14.1
* gimp-plugin-aa-2.10.30-150400.3.14.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.14.1
* gimp-devel-debuginfo-2.10.30-150400.3.14.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* gimp-debuginfo-2.10.30-150400.3.14.1
* libgimpui-2_0-0-2.10.30-150400.3.14.1
* libgimp-2_0-0-2.10.30-150400.3.14.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debugsource-2.10.30-150400.3.14.1
* SUSE Package Hub 15 15-SP6 (noarch)
* gimp-lang-2.10.30-150400.3.14.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* libgimpui-2_0-0-2.10.30-150400.3.14.1
* gimp-devel-2.10.30-150400.3.14.1
* gimp-2.10.30-150400.3.14.1
* libgimp-2_0-0-2.10.30-150400.3.14.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debuginfo-2.10.30-150400.3.14.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1
* gimp-debugsource-2.10.30-150400.3.14.1
* gimp-devel-debuginfo-2.10.30-150400.3.14.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch)
* gimp-lang-2.10.30-150400.3.14.1
## References:
* https://www.suse.com/security/cve/CVE-2025-2761.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241691
SUSE-SU-2025:1572-1: moderate: Security update for libraw
# Security update for libraw
Announcement ID: SUSE-SU-2025:1572-1
Release Date: 2025-05-16T14:07:16Z
Rating: moderate
References:
* bsc#1241584
* bsc#1241585
* bsc#1241642
* bsc#1241643
Cross-References:
* CVE-2025-43961
* CVE-2025-43962
* CVE-2025-43963
* CVE-2025-43964
CVSS scores:
* CVE-2025-43961 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43961 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43961 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43961 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43962 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43962 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-43962 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43962 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43963 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43963 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-43963 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43964 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-43964 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-43964 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-43964 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for libraw fixes the following issues:
* CVE-2025-43961: Fixed out-of-bounds read in the Fujifilm 0xf00c tag parser
in metadata/tiff.cpp (bsc#1241643)
* CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in
phase_one_correct function (bsc#1241585)
* CVE-2025-43963: Fixed out-of-buffer access during phase_one_correct in
decoders/load_mfbacks.cpp (bsc#1241642)
* CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct does not
enforce minimum w0 and w1 values (bsc#1241584)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1572=1 openSUSE-SLE-15.6-2025-1572=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1572=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1572=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1572=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libraw-debugsource-0.21.1-150600.3.5.1
* libraw23-debuginfo-0.21.1-150600.3.5.1
* libraw23-0.21.1-150600.3.5.1
* libraw-devel-static-0.21.1-150600.3.5.1
* libraw-devel-0.21.1-150600.3.5.1
* libraw-tools-0.21.1-150600.3.5.1
* libraw-tools-debuginfo-0.21.1-150600.3.5.1
* openSUSE Leap 15.6 (x86_64)
* libraw23-32bit-0.21.1-150600.3.5.1
* libraw23-32bit-debuginfo-0.21.1-150600.3.5.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libraw23-64bit-0.21.1-150600.3.5.1
* libraw23-64bit-debuginfo-0.21.1-150600.3.5.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libraw-debugsource-0.21.1-150600.3.5.1
* libraw23-0.21.1-150600.3.5.1
* libraw23-debuginfo-0.21.1-150600.3.5.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* libraw-debugsource-0.21.1-150600.3.5.1
* libraw-devel-static-0.21.1-150600.3.5.1
* libraw-devel-0.21.1-150600.3.5.1
* libraw-tools-0.21.1-150600.3.5.1
* libraw-tools-debuginfo-0.21.1-150600.3.5.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* libraw-debugsource-0.21.1-150600.3.5.1
* libraw-devel-0.21.1-150600.3.5.1
## References:
* https://www.suse.com/security/cve/CVE-2025-43961.html
* https://www.suse.com/security/cve/CVE-2025-43962.html
* https://www.suse.com/security/cve/CVE-2025-43963.html
* https://www.suse.com/security/cve/CVE-2025-43964.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241584
* https://bugzilla.suse.com/show_bug.cgi?id=1241585
* https://bugzilla.suse.com/show_bug.cgi?id=1241642
* https://bugzilla.suse.com/show_bug.cgi?id=1241643
openSUSE-SU-2025:15092-1: moderate: pnpm-10.11.0-1.1 on GA media
# pnpm-10.11.0-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15092-1
Rating: moderate
Cross-References:
* CVE-2021-1234
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the pnpm-10.11.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* pnpm 10.11.0-1.1
* pnpm-bash-completion 10.11.0-1.1
* pnpm-fish-completion 10.11.0-1.1
* pnpm-zsh-completion 10.11.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2021-1234.html
openSUSE-SU-2025:15093-1: moderate: ucode-intel-20250512-1.1 on GA media
# ucode-intel-20250512-1.1 on GA media
Announcement ID: openSUSE-SU-2025:15093-1
Rating: moderate
Cross-References:
* CVE-2024-28956
* CVE-2024-43420
* CVE-2024-45332
* CVE-2025-20012
* CVE-2025-20054
* CVE-2025-20103
* CVE-2025-20623
* CVE-2025-24495
CVSS scores:
* CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-45332 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-45332 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-20012 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-20012 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-24495 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-24495 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 8 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the ucode-intel-20250512-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* ucode-intel 20250512-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28956.html
* https://www.suse.com/security/cve/CVE-2024-43420.html
* https://www.suse.com/security/cve/CVE-2024-45332.html
* https://www.suse.com/security/cve/CVE-2025-20012.html
* https://www.suse.com/security/cve/CVE-2025-20054.html
* https://www.suse.com/security/cve/CVE-2025-20103.html
* https://www.suse.com/security/cve/CVE-2025-20623.html
* https://www.suse.com/security/cve/CVE-2025-24495.html