Packages changed:
 apparmor
 distribution-logos-openSUSE (20241022 -> 20250203)
 dtc
 freerdp
 krb5
 libapparmor
 libsmbios
 openSUSE-release (20250205 -> 20250206)
 pam_pkcs11 (0.6.12 -> 0.6.13)
 python-cryptography (43.0.3 -> 44.0.0)
 python-pyOpenSSL (24.2.1 -> 25.0.0)
 sssd (2.10.1 -> 2.10.2)
 tiff

=== Details ===

==== apparmor ====
Subpackages: apparmor-abstractions apparmor-docs apparmor-parser apparmor-parser-lang apparmor-profiles apparmor-utils apparmor-utils-lang python3-apparmor

- add python313.patch to fix build with python 3.13

==== distribution-logos-openSUSE ====
Version update (20241022 -> 20250203)
Subpackages: distribution-logos-openSUSE-Aeon distribution-logos-openSUSE-Tumbleweed distribution-logos-openSUSE-icons

- Update to version 20250203:
 * Kalpa: Add Distribution Logos

==== dtc ====

- Mark assembler output as noexecstack

==== freerdp ====
Subpackages: libfreerdp3-3 librdtk0-0 libwinpr3-3

- Drop pkgconfig(webkit2gtk-4.0) BuildRequires, we are not passing
 webview=on to cmake, hence unused and nobody complained.

==== krb5 ====
Subpackages: krb5-32bit krb5-client

- Prevent overflow when calculating ulog block size. An authenticated
 attacker can cause kadmind to write beyond the end of the mapped
 region for the iprop log file, likely causing a process crash;
 (CVE-2025-24528); (bsc#1236619).
- Add patch 0010-CVE-2025-24528.patch

==== libapparmor ====

- add python313.patch to fix build with python 3.13

==== libsmbios ====
Subpackages: libsmbios-lang libsmbios_c2 python3-smbios python3-smbios-utils

- switch to manual service runs
- Add unittest-drop-makeSuite.patch to adapt the testsuite to Python 3.13

==== openSUSE-release ====
Version update (20250205 -> 20250206)
Subpackages: openSUSE-release-appliance-custom openSUSE-release-dvd

- automatically generated by openSUSE-release-tools/pkglistgen

==== pam_pkcs11 ====
Version update (0.6.12 -> 0.6.13)

- Update to 0.6.13
 * Added pkcs11-eventmgr systemd service unit.
 * Updated Russian translations for pam_pkcs11 (thx Max Kosmach      and Andrey Cherepanov).
 * Fixed possible authentication bypass (CVE-2025-24032):
 * Use signatures to verify authentication by default      (thx Frank Morgner).
 * Fixed possible authentication bypass (CVE-2025-24531):
 * Restoring the original card_only / wait_for_card behavior      (thx Matthias Gerstner, Frank Morgner).
 * Move pam_securetty.so upward in the example PAM config.
 * Set 'slot_num' configuration parameter to 0 by default     (thx Jpereyra316).
 * Print details about configuration parse errors (thx Jpereyra316).
 * Add Chinese (Simplified) translation.
 * Capitalize all PAM messages (thx Alynx Zhou).
 * Made pkcs11_make_hash_link support whitespaces in file names
 * Drop 0001-Set-slot_num-configuration-parameter-to-0-by-default.patch
 * Drop 0001-memory-leak-fixes.patch
 * Rebase pam_pkcs11-0.5.3-nss-conf.patch
 * Rebase pam_pkcs11-0.6.0-nss-autoconf.patch

==== python-cryptography ====
Version update (43.0.3 -> 44.0.0)

- Update to version 44.0.0:
 * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.9.
 * Deprecated Python 3.7 support. Python 3.7 is no longer supported by
   the Python core team. Support for Python 3.7 will be removed in a future
   cryptography release.
 * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0.
 * macOS wheels are now built against the macOS 10.13 SDK. Users on older
   versions of macOS should upgrade, or they will need to build cryptography
   themselves.
 * Enforce the RFC 5280 requirement that extended key usage extensions must not be empty.
 * Added support for timestamp extraction to the :class:`~cryptography.fernet.MultiFernet` class.
 * Relax the Authority Key Identifier requirements on root CA certificates
   during X.509 verification to allow fields permitted by RFC 5280 but
   forbidden by the CA/Browser BRs.
 * Added support for
   :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using
   OpenSSL 3.2.0+.
 * Added support for the :class:`~cryptography.x509.Admissions` certificate extension.
 * Added basic support for PKCS7 decryption (including S/MIME 3.2) via
   :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
   :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`,
   and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
- Update specfile to accommodate new project structure at version 44.0.0
- Update no-pytest_benchmark.patch

==== python-pyOpenSSL ====
Version update (24.2.1 -> 25.0.0)

- Switch to pyproject macros.
- Add typing-extensions to Requires for 3.11 and 3.12.
- Update to 25.0.0
 * Backward-incompatible changes: -
 * Deprecations: -
 * Changes:
 - Corrected type annotations on Context.set_alpn_select_callback,
   Context.set_session_cache_mode, Context.set_options, Context.set_mode,
   X509.subject_name_hash, and X509Store.load_locations.
 - Deprecated APIs are now marked using warnings.deprecated. mypy will emit deprecation notices
   for them when used with --enable-error-code deprecated.
- Changes from 24.3.0
 * Backward-incompatible changes:
 - Removed the deprecated OpenSSL.crypto.CRL, OpenSSL.crypto.Revoked, OpenSSL.crypto.dump_crl,
   and OpenSSL.crypto.load_crl. cryptography.x509's CRL functionality should be used instead.
 - Removed the deprecated OpenSSL.crypto.sign and OpenSSL.crypto.verify.
   cryptography.hazmat.primitives.asymmetric's signature APIs should be used instead.
 * Deprecations:
 - Deprecated OpenSSL.rand - callers should use os.urandom() instead.
 - Deprecated add_extensions and get_extensions on OpenSSL.crypto.X509Req and OpenSSL.crypto.X509.
   These should have been deprecated at the same time X509Extension was. Users should use pyca/cryptography's X.509 APIs instead.
 - Deprecated OpenSSL.crypto.get_elliptic_curves and OpenSSL.crypto.get_elliptic_curve,
   as well as passing the reult of them to OpenSSL.SSL.Context.set_tmp_ecdh,
   users should instead pass curves from cryptography.
 - Deprecated passing X509 objects to OpenSSL.SSL.Context.use_certificate, OpenSSL.SSL.Connection.use_certificate,
   OpenSSL.SSL.Context.add_extra_chain_cert, and OpenSSL.SSL.Context.add_client_ca, users should instead
   pass cryptography.x509.Certificate instances. This is in preparation for deprecating pyOpenSSL's X509 entirely.
 - Deprecated passing PKey objects to OpenSSL.SSL.Context.use_privatekey and OpenSSL.SSL.Connection.use_privatekey,
   users should instead pass cryptography priate key instances. This is in preparation for deprecating pyOpenSSL's PKey entirely.
 * Changes:
 - cryptography maximum version has been increased to 44.0.x.
 - OpenSSL.SSL.Connection.get_certificate, OpenSSL.SSL.Connection.get_peer_certificate,
   OpenSSL.SSL.Connection.get_peer_cert_chain, and OpenSSL.SSL.Connection.get_verified_chain
   now take an as_cryptography keyword-argument. When True is passed then
   cryptography.x509.Certificate are returned, instead of OpenSSL.crypto.X509.
   In the future, passing False (the default) will be deprecated.
- Rebase skip-networked-test.patch.

==== sssd ====
Version update (2.10.1 -> 2.10.2)
Subpackages: libnfsidmap-sss libsss_certmap0 libsss_idmap0 sssd-krb5-common sssd-ldap

- Update to release 2.10.2
 * If the ssh responder is not running, sss_ssh_knownhosts will
   not fail (but it will not return the keys).
 * SSSD is now capable of handling multiple services associated
   with the same port.
 * sssd_pam, being a privileged binary, now clears the
   environment and does not allow configuration of the
   PR_SET_DUMPABLE flag as a precaution.

==== tiff ====

- Update test/test_directory.c not to fail on big-endian machines.
 * Add tiff-4.7.0-test_directory.patch
   Fix memory leaks (fixes issue #652)
 * Resolves bsc#1236834
   fix build fail on s390x