openSUSE-Leap-16.0-4 Recommended update of cloud-regionsrv-client moderate SUSE SLFO 1.2 This update for cloud-regionsrv-client fixes the following issues: Update version to 10.5.2 (bsc#1247539) + When an instance fails verification server side the default credentials were left behind requireing manual intervantion prior to the next registration attempt. + Fix issue triggered when using instance-billing-flavor-check due to IP address handling as object rather than string introduced 10.5.0 cloud-regionsrv-client-10.5.2-160000.3.1.noarch.rpm cloud-regionsrv-client-10.5.2-160000.3.1.src.rpm cloud-regionsrv-client-generic-config-1.0.0-160000.3.1.noarch.rpm cloud-regionsrv-client-license-watcher-1.0.0-160000.3.1.noarch.rpm cloud-regionsrv-client-plugin-azure-2.0.0-160000.3.1.noarch.rpm cloud-regionsrv-client-plugin-ec2-1.0.5-160000.3.1.noarch.rpm cloud-regionsrv-client-plugin-gce-1.0.0-160000.3.1.noarch.rpm openSUSE-Leap-16.0-3 Recommended update of python-instance-billing-flavor-check moderate SUSE SLFO 1.2 This update for python-instance-billing-flavor-check fixes the following issues: - Build fix for SLE 16 and later (bsc#1250110) python-instance-billing-flavor-check-1.0.1-160000.3.1.aarch64.rpm python-instance-billing-flavor-check-1.0.1-160000.3.1.src.rpm openSUSE-Leap-16.0-3 Recommended update of python-instance-billing-flavor-check moderate SUSE SLFO 1.2 This update for python-instance-billing-flavor-check fixes the following issues: - Build fix for SLE 16 and later (bsc#1250110) python-instance-billing-flavor-check-1.0.1-160000.3.1.ppc64le.rpm python-instance-billing-flavor-check-1.0.1-160000.3.1.src.rpm openSUSE-Leap-16.0-3 Recommended update of python-instance-billing-flavor-check moderate SUSE SLFO 1.2 This update for python-instance-billing-flavor-check fixes the following issues: - Build fix for SLE 16 and later (bsc#1250110) python-instance-billing-flavor-check-1.0.1-160000.3.1.s390x.rpm python-instance-billing-flavor-check-1.0.1-160000.3.1.src.rpm openSUSE-Leap-16.0-3 Recommended update of python-instance-billing-flavor-check moderate SUSE SLFO 1.2 This update for python-instance-billing-flavor-check fixes the following issues: - Build fix for SLE 16 and later (bsc#1250110) python-instance-billing-flavor-check-1.0.1-160000.3.1.src.rpm python-instance-billing-flavor-check-1.0.1-160000.3.1.x86_64.rpm openSUSE-Leap-16.0-2 Recommended update of flake-pilot moderate SUSE SLFO 1.2 This update for flake-pilot fixes the following issues: Update version to 3.1.22. - Fixes to use flakes as normal user Running a flake is a container based instance provisioning and startup. Some part of this process requires root permissions for example mounting the container instance store for the provisioning step. This commit fixes the required calls to be properly managed by sudo. - seed from entropy - Fix assignment of random sequence number We should use a seed for the sequence as described in https://rust-random.github.io/book/guide-seeding.html#a-simple-number In addition the logic when a random sequence number should be used was wrong and needed a fix regarding resume and attach type flakes which must not use a random sequence - Pass --init option for resume type flakes In resume mode a sleep command is used to keep the container open. However, without the --init option there is no signal handling available. This commit fixes it - Revert "kill prior remove when using %remove flag" This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2. no hard killing needed with the event loop entrypoint - Fixed CVE-2025-55159 slab: incorrect bounds check Update to slab 0.4.11 to fix the mentioned CVE. This Fixes bsc#1248004 - Apply clippy fixes - Create sequence number for the same invocation If a flake which is not a resume or attach flake is called twice with the same invocation arguments an error message is displayed to give this invocation a new name via the @NAME runtime option. This commit makes this more comfortable and automatically assigns a random sequence number for the call if no @NAME is given. - kill prior remove when using %remove flag In case the container instance should be removed via the %remove flag, send a kill first, followed by a force remove. The reason for this is because we use a never ending sleep command as entry point for resume type containers. If they should be removed the standard signal send on podman rm will not stop the sleep and after a period of 10 seconds podman sends a kill signal itself. We can speedup this process as we know the entry point command and send the kill signal first followed by the remove which saves us some wait time spent in podman otherwise. - Fix clippy hints variables can be used directly in the format! string - Prune old images after load Make sure no <none> image references stay in the registry flake-pilot-3.1.22-160000.1.1.aarch64.rpm flake-pilot-3.1.22-160000.1.1.src.rpm flake-pilot-debuginfo-3.1.22-160000.1.1.aarch64.rpm flake-pilot-firecracker-3.1.22-160000.1.1.aarch64.rpm flake-pilot-firecracker-debuginfo-3.1.22-160000.1.1.aarch64.rpm flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch.rpm flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64.rpm flake-pilot-firecracker-guestvm-tools-debuginfo-3.1.22-160000.1.1.aarch64.rpm flake-pilot-podman-3.1.22-160000.1.1.aarch64.rpm openSUSE-Leap-16.0-2 Recommended update of flake-pilot moderate SUSE SLFO 1.2 This update for flake-pilot fixes the following issues: Update version to 3.1.22. - Fixes to use flakes as normal user Running a flake is a container based instance provisioning and startup. Some part of this process requires root permissions for example mounting the container instance store for the provisioning step. This commit fixes the required calls to be properly managed by sudo. - seed from entropy - Fix assignment of random sequence number We should use a seed for the sequence as described in https://rust-random.github.io/book/guide-seeding.html#a-simple-number In addition the logic when a random sequence number should be used was wrong and needed a fix regarding resume and attach type flakes which must not use a random sequence - Pass --init option for resume type flakes In resume mode a sleep command is used to keep the container open. However, without the --init option there is no signal handling available. This commit fixes it - Revert "kill prior remove when using %remove flag" This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2. no hard killing needed with the event loop entrypoint - Fixed CVE-2025-55159 slab: incorrect bounds check Update to slab 0.4.11 to fix the mentioned CVE. This Fixes bsc#1248004 - Apply clippy fixes - Create sequence number for the same invocation If a flake which is not a resume or attach flake is called twice with the same invocation arguments an error message is displayed to give this invocation a new name via the @NAME runtime option. This commit makes this more comfortable and automatically assigns a random sequence number for the call if no @NAME is given. - kill prior remove when using %remove flag In case the container instance should be removed via the %remove flag, send a kill first, followed by a force remove. The reason for this is because we use a never ending sleep command as entry point for resume type containers. If they should be removed the standard signal send on podman rm will not stop the sleep and after a period of 10 seconds podman sends a kill signal itself. We can speedup this process as we know the entry point command and send the kill signal first followed by the remove which saves us some wait time spent in podman otherwise. - Fix clippy hints variables can be used directly in the format! string - Prune old images after load Make sure no <none> image references stay in the registry flake-pilot-3.1.22-160000.1.1.ppc64le.rpm flake-pilot-3.1.22-160000.1.1.src.rpm flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le.rpm flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch.rpm flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le.rpm flake-pilot-podman-3.1.22-160000.1.1.ppc64le.rpm openSUSE-Leap-16.0-2 Recommended update of flake-pilot moderate SUSE SLFO 1.2 This update for flake-pilot fixes the following issues: Update version to 3.1.22. - Fixes to use flakes as normal user Running a flake is a container based instance provisioning and startup. Some part of this process requires root permissions for example mounting the container instance store for the provisioning step. This commit fixes the required calls to be properly managed by sudo. - seed from entropy - Fix assignment of random sequence number We should use a seed for the sequence as described in https://rust-random.github.io/book/guide-seeding.html#a-simple-number In addition the logic when a random sequence number should be used was wrong and needed a fix regarding resume and attach type flakes which must not use a random sequence - Pass --init option for resume type flakes In resume mode a sleep command is used to keep the container open. However, without the --init option there is no signal handling available. This commit fixes it - Revert "kill prior remove when using %remove flag" This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2. no hard killing needed with the event loop entrypoint - Fixed CVE-2025-55159 slab: incorrect bounds check Update to slab 0.4.11 to fix the mentioned CVE. This Fixes bsc#1248004 - Apply clippy fixes - Create sequence number for the same invocation If a flake which is not a resume or attach flake is called twice with the same invocation arguments an error message is displayed to give this invocation a new name via the @NAME runtime option. This commit makes this more comfortable and automatically assigns a random sequence number for the call if no @NAME is given. - kill prior remove when using %remove flag In case the container instance should be removed via the %remove flag, send a kill first, followed by a force remove. The reason for this is because we use a never ending sleep command as entry point for resume type containers. If they should be removed the standard signal send on podman rm will not stop the sleep and after a period of 10 seconds podman sends a kill signal itself. We can speedup this process as we know the entry point command and send the kill signal first followed by the remove which saves us some wait time spent in podman otherwise. - Fix clippy hints variables can be used directly in the format! string - Prune old images after load Make sure no <none> image references stay in the registry flake-pilot-3.1.22-160000.1.1.s390x.rpm flake-pilot-3.1.22-160000.1.1.src.rpm flake-pilot-debuginfo-3.1.22-160000.1.1.s390x.rpm flake-pilot-firecracker-3.1.22-160000.1.1.s390x.rpm flake-pilot-firecracker-debuginfo-3.1.22-160000.1.1.s390x.rpm flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch.rpm flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x.rpm flake-pilot-firecracker-guestvm-tools-debuginfo-3.1.22-160000.1.1.s390x.rpm flake-pilot-podman-3.1.22-160000.1.1.s390x.rpm openSUSE-Leap-16.0-2 Recommended update of flake-pilot moderate SUSE SLFO 1.2 This update for flake-pilot fixes the following issues: Update version to 3.1.22. - Fixes to use flakes as normal user Running a flake is a container based instance provisioning and startup. Some part of this process requires root permissions for example mounting the container instance store for the provisioning step. This commit fixes the required calls to be properly managed by sudo. - seed from entropy - Fix assignment of random sequence number We should use a seed for the sequence as described in https://rust-random.github.io/book/guide-seeding.html#a-simple-number In addition the logic when a random sequence number should be used was wrong and needed a fix regarding resume and attach type flakes which must not use a random sequence - Pass --init option for resume type flakes In resume mode a sleep command is used to keep the container open. However, without the --init option there is no signal handling available. This commit fixes it - Revert "kill prior remove when using %remove flag" This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2. no hard killing needed with the event loop entrypoint - Fixed CVE-2025-55159 slab: incorrect bounds check Update to slab 0.4.11 to fix the mentioned CVE. This Fixes bsc#1248004 - Apply clippy fixes - Create sequence number for the same invocation If a flake which is not a resume or attach flake is called twice with the same invocation arguments an error message is displayed to give this invocation a new name via the @NAME runtime option. This commit makes this more comfortable and automatically assigns a random sequence number for the call if no @NAME is given. - kill prior remove when using %remove flag In case the container instance should be removed via the %remove flag, send a kill first, followed by a force remove. The reason for this is because we use a never ending sleep command as entry point for resume type containers. If they should be removed the standard signal send on podman rm will not stop the sleep and after a period of 10 seconds podman sends a kill signal itself. We can speedup this process as we know the entry point command and send the kill signal first followed by the remove which saves us some wait time spent in podman otherwise. - Fix clippy hints variables can be used directly in the format! string - Prune old images after load Make sure no <none> image references stay in the registry flake-pilot-3.1.22-160000.1.1.src.rpm flake-pilot-3.1.22-160000.1.1.x86_64.rpm flake-pilot-debuginfo-3.1.22-160000.1.1.x86_64.rpm flake-pilot-firecracker-3.1.22-160000.1.1.x86_64.rpm flake-pilot-firecracker-debuginfo-3.1.22-160000.1.1.x86_64.rpm flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch.rpm flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64.rpm flake-pilot-firecracker-guestvm-tools-debuginfo-3.1.22-160000.1.1.x86_64.rpm flake-pilot-podman-3.1.22-160000.1.1.x86_64.rpm openSUSE-Leap-16.0-packagehub-1 Security update for chromium critical openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.76: * Do not send URLs as AIM input. This is to resolve a privacy concern, around passing urls to AI Mode. Chromium 141.0.7390.65 (boo#1251334): * CVE-2025-11458: Heap buffer overflow in Sync * CVE-2025-11460: Use after free in Storage * CVE-2025-11211: Out of bounds read in WebCodecs Chromium 141.0.7390.54 (stable released 2025-09-30) (boo#1250780) * CVE-2025-11205: Heap buffer overflow in WebGPU * CVE-2025-11206: Heap buffer overflow in Video * CVE-2025-11207: Side-channel information leakage in Storage * CVE-2025-11208: Inappropriate implementation in Media * CVE-2025-11209: Inappropriate implementation in Omnibox * CVE-2025-11210: Side-channel information leakage in Tab * CVE-2025-11211: Out of bounds read in Media * CVE-2025-11212: Inappropriate implementation in Media * CVE-2025-11213: Inappropriate implementation in Omnibox * CVE-2025-11215: Off by one error in V8 * CVE-2025-11216: Inappropriate implementation in Storage * CVE-2025-11219: Use after free in V8 * Various fixes from internal audits, fuzzing and other initiatives Chromium 141.0.7390.37 (beta released 2025-09-24) Chromium 140.0.7339.207 (boo#1250472) * CVE-2025-10890: Side-channel information leakage in V8 * CVE-2025-10891: Integer overflow in V8 * CVE-2025-10892: Integer overflow in V8 chromedriver-141.0.7390.76-bp160.1.1.aarch64.rpm chromium-141.0.7390.76-bp160.1.1.aarch64.rpm chromium-141.0.7390.76-bp160.1.1.nosrc.rpm openSUSE-Leap-16.0-packagehub-1 Security update for chromium critical openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.76: * Do not send URLs as AIM input. This is to resolve a privacy concern, around passing urls to AI Mode. Chromium 141.0.7390.65 (boo#1251334): * CVE-2025-11458: Heap buffer overflow in Sync * CVE-2025-11460: Use after free in Storage * CVE-2025-11211: Out of bounds read in WebCodecs Chromium 141.0.7390.54 (stable released 2025-09-30) (boo#1250780) * CVE-2025-11205: Heap buffer overflow in WebGPU * CVE-2025-11206: Heap buffer overflow in Video * CVE-2025-11207: Side-channel information leakage in Storage * CVE-2025-11208: Inappropriate implementation in Media * CVE-2025-11209: Inappropriate implementation in Omnibox * CVE-2025-11210: Side-channel information leakage in Tab * CVE-2025-11211: Out of bounds read in Media * CVE-2025-11212: Inappropriate implementation in Media * CVE-2025-11213: Inappropriate implementation in Omnibox * CVE-2025-11215: Off by one error in V8 * CVE-2025-11216: Inappropriate implementation in Storage * CVE-2025-11219: Use after free in V8 * Various fixes from internal audits, fuzzing and other initiatives Chromium 141.0.7390.37 (beta released 2025-09-24) Chromium 140.0.7339.207 (boo#1250472) * CVE-2025-10890: Side-channel information leakage in V8 * CVE-2025-10891: Integer overflow in V8 * CVE-2025-10892: Integer overflow in V8 chromedriver-141.0.7390.76-bp160.1.1.ppc64le.rpm chromium-141.0.7390.76-bp160.1.1.nosrc.rpm chromium-141.0.7390.76-bp160.1.1.ppc64le.rpm openSUSE-Leap-16.0-packagehub-1 Security update for chromium critical openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.76: * Do not send URLs as AIM input. This is to resolve a privacy concern, around passing urls to AI Mode. Chromium 141.0.7390.65 (boo#1251334): * CVE-2025-11458: Heap buffer overflow in Sync * CVE-2025-11460: Use after free in Storage * CVE-2025-11211: Out of bounds read in WebCodecs Chromium 141.0.7390.54 (stable released 2025-09-30) (boo#1250780) * CVE-2025-11205: Heap buffer overflow in WebGPU * CVE-2025-11206: Heap buffer overflow in Video * CVE-2025-11207: Side-channel information leakage in Storage * CVE-2025-11208: Inappropriate implementation in Media * CVE-2025-11209: Inappropriate implementation in Omnibox * CVE-2025-11210: Side-channel information leakage in Tab * CVE-2025-11211: Out of bounds read in Media * CVE-2025-11212: Inappropriate implementation in Media * CVE-2025-11213: Inappropriate implementation in Omnibox * CVE-2025-11215: Off by one error in V8 * CVE-2025-11216: Inappropriate implementation in Storage * CVE-2025-11219: Use after free in V8 * Various fixes from internal audits, fuzzing and other initiatives Chromium 141.0.7390.37 (beta released 2025-09-24) Chromium 140.0.7339.207 (boo#1250472) * CVE-2025-10890: Side-channel information leakage in V8 * CVE-2025-10891: Integer overflow in V8 * CVE-2025-10892: Integer overflow in V8 chromedriver-141.0.7390.76-bp160.1.1.x86_64.rpm chromium-141.0.7390.76-bp160.1.1.nosrc.rpm chromium-141.0.7390.76-bp160.1.1.x86_64.rpm openSUSE-Leap-16.0-openSUSE_Backports_SLE-16.0 Security update for chromium moderate openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.107: * CVE-2025-11756: Use after free in Safe Browsing (boo#1252013) chromedriver-141.0.7390.107-bp160.1.1.aarch64.rpm chromium-141.0.7390.107-bp160.1.1.aarch64.rpm chromium-141.0.7390.107-bp160.1.1.nosrc.rpm openSUSE-Leap-16.0-openSUSE_Backports_SLE-16.0 Security update for chromium moderate openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.107: * CVE-2025-11756: Use after free in Safe Browsing (boo#1252013) chromedriver-141.0.7390.107-bp160.1.1.ppc64le.rpm chromium-141.0.7390.107-bp160.1.1.nosrc.rpm chromium-141.0.7390.107-bp160.1.1.ppc64le.rpm openSUSE-Leap-16.0-openSUSE_Backports_SLE-16.0 Security update for chromium moderate openSUSE Backports SLE-16.0 This update for chromium fixes the following issues: Chromium 141.0.7390.107: * CVE-2025-11756: Use after free in Safe Browsing (boo#1252013) chromedriver-141.0.7390.107-bp160.1.1.x86_64.rpm chromium-141.0.7390.107-bp160.1.1.nosrc.rpm chromium-141.0.7390.107-bp160.1.1.x86_64.rpm