# Security update for s390-tools Announcement ID: SUSE-SU-2025:01631-1 Release Date: 2025-05-21T10:03:45Z Rating: moderate References: * bsc#1242622 * jsc#PED-12028 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Manager Server 4.3 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for s390-tools rebuilds the existing package with the new 4k RSA secure boot key. Security issues fixed: * CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate. (bsc#1242622) Other issues: * Added the new IBM z17 (9175) processor type ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1631=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1631=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1631=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1631=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1631=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1631=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1631=1 ## Package List: * openSUSE Leap 15.4 (s390x x86_64) * s390-tools-debugsource-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * openSUSE Leap 15.4 (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * libkmipclient1-devel-2.31.0-150400.7.31.1 * openSUSE Leap 15.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 * SUSE Manager Server 4.3 (s390x) * s390-tools-hmcdrvfs-debuginfo-2.31.0-150400.7.31.1 * osasnmpd-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-debuginfo-2.31.0-150400.7.31.1 * s390-tools-zdsfs-2.31.0-150400.7.31.1 * libkmipclient1-debuginfo-2.31.0-150400.7.31.1 * libekmfweb1-devel-2.31.0-150400.7.31.1 * s390-tools-2.31.0-150400.7.31.1 * osasnmpd-2.31.0-150400.7.31.1 * s390-tools-debuginfo-2.31.0-150400.7.31.1 * s390-tools-hmcdrvfs-2.31.0-150400.7.31.1 * s390-tools-zdsfs-debuginfo-2.31.0-150400.7.31.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150400.7.31.1 * libekmfweb1-2.31.0-150400.7.31.1 * libkmipclient1-2.31.0-150400.7.31.1 * s390-tools-debugsource-2.31.0-150400.7.31.1 * SUSE Manager Server 4.3 (noarch) * s390-tools-genprotimg-data-2.31.0-150400.7.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242622 * https://jira.suse.com/browse/PED-12028