SUSE Linux Enterprise Server Release Notes #
SUSE Linux Enterprise Server is a modern, modular operating system for both multimodal and traditional IT. This document provides a high-level overview of features, capabilities and limitations, and highlights important product updates.
1 About the release notes #
These Release Notes are identical across all architectures, and the most recent version is always available online at https://www.suse.com/releasenotes.
Entries are only listed once but they can be referenced in several places if they are important and belong to more than one section.
Release notes usually only list changes that happened between two subsequent releases. Certain important entries from the release notes of previous product versions are repeated. To make these entries easier to identify, they contain a note to that effect.
However, repeated entries are provided as a courtesy only. Therefore, if you are skipping one or more service packs, check the release notes of the skipped service packs as well. If you are only reading the release notes of the current release, you could miss important changes.
1.1 Documentation and other information #
For the most up-to-date version of the documentation for SUSE Linux Enterprise Server, see:
2 SUSE Linux Enterprise Server Version 16.0 #
These release notes apply to SUSE Linux Enterprise Server 16.0.
2.1 Changes affecting all architectures #
2.1.1 Removal of 32-bit support #
SUSE Linux Enterprise Server 16.0 only supports 64-bit binaries. Support for 31-/32-bit binaries has been removed.
This means that statically-linked 31-/32-bit binaries and container images cannot be run anymore.
2.1.2 Compiling kernel uses non-default compiler #
Customers who need to build kernel modules or rebuild the kernel must use the same compiler version the kernel was built with.
The kernel is built with gcc
version 13, which is not the default compiler.
Install the gcc version 13 compiler using the gcc13
package and invoke it with the command gcc-13
.
This specific compiler version is only supported for building kernel modules and the kernel.
2.1.3 Optimized libraries for newer hardware architectures #
We have added support for the glibc-HWCAPS feature which loads optimized versions of libraries for specific newer CPUs automatically.
The build infrastructure for this feature is enabled for the following libraries:
blosc2
boost
brotli
bzip2
flac
jsoncpp
lame
leveldb
libdb-4_8
libgcrypt
libiscsi
libjpeg-turbo
libjxl
libmng
libnettle
libpng16
libvorbis
libxmlb
lz4
lzo
openjpeg2
openssl-3
python311
python313
sqlite3
talloc
tree-sitter
wavpack
xxhash
xz
zlib
zopfli
zstd
2.1.4 No remote root
login with password #
If you install the system using only a root
password and do not provide an SSH key for the root user, sshd
will not be enabled automatically after installation.
You will not be able to log in remotely as root using the password.
By default, remote password-based root
login is disabled.
The installer enables the sshd
service only when an SSH key for root is configured during setup.
To allow remote root
login, configure an SSH key for root during installation.
2.1.5 Default user group assignment changed #
Previously, all user accounts belonged to a single users
group.
Now instead of being added to the common users
group, each new user now gets their own primary group matching their username.
This is due to USERGROUPS_ENAB
being enabled in /usr/etc/login.defs
.
This change affects all new installations and upgraded systems that did not change the default /etc/login.defs
.
This has several consequences:
files created by new users are not group-readable by default
configurations that used the primary
users
group as a condition do not work anymoreconfigurations that used the primary or secondary
users
group as a condition need to have theusers
group manually added to these user accounts in order to continue to work, for example, to for@users
in the sudoers filehome directories inherited from a previous system need to standardize the GID of the files by running:
find "$HOME" -group users -exec chgrp myuser {} \;
, orchgrp -R myuser "$HOME"
if you did not use any GID other thanusers
2.1.6 SysV init.d scripts support #
SysV init.d scripts have been deprecated since SLES 15 SP2.
In SLES 16.0, support of SysV init.d scripts has been removed.
2.2 Changes affecting all architectures (Beta4) #
2.2.1 Configuring network interfaces during installation #
Currently, the installer does not allow for setting up network interfaces using the UI. However, in the meantime you can use dracut-like command-line options, for example:
ifname=<interface>:<MAC> ip=<interface>:dhcp
Additionally, the inst.copy_network
is not available in Beta4.
2.2.2 SAP workloads on SLES 16.0 #
For running SAP workloads on SUSE Linux Enterprise Server 16.0, do the following:
Run these commands after system installation:
semanage boolean -m --on selinuxuser_execmod semanage boolean -m --on unconfined_service_transition_to_unconfined_user semanage permissive -a snapper_grub_plugin_t restorecon -R /
Install SAP workload or SAP HANA
Run
restorecon -R /
.
2.2.3 FIPS 140-3 not working properly #
FIPS 140-3 installation has not been fully validated and may cause unexpected software failure or crashes. Therefore, we discourage you from using it on Beta4.
2.3 Changes affecting all architectures (Beta3) #
2.3.1 Missing libnsl.so.1
library #
The libnsl.so.1
library has been deprecated in SLES 15 and finally removed in SUSE Linux Enterprise Server 16.0.
As a workaround for applications that cannot be installed without it (but presumaly do not use it for anything), we provide the libnsl-stub1
package that includes ABI-compatible but otherwise function-less stub of the library file.
2.3.2 firewalld
not usable with many interfaces #
Due to an upstream bug, firewalld
might take a long time or time out when adding many interfaces.
The error occurs when firewalld
is restarted after applying such a configuration.
The following message appears in the system logs:
ERROR:dbus.proxies:Introspect error on :1.18:/org/fedoraproject/FirewallD1: dbus.exceptions.DBusException: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.
See https://github.com/firewalld/firewalld/issues/1399 for more information.
2.4 Changes affecting all architectures (Beta2) #
2.4.1 Switch from YaST to Cockpit #
SUSE Linux Enterprise Server 16.0 has switched from YaST to Cockpit for manual system administration. We have enhanced Cockpit with new modules with the intention to upstream them later. Despite being functional, bugs might appear and features might be missing.
New modules
cockpit-subscriptions
: register, de-register and view SUSE Linux Enterprise registrations. Does not work for unprivileged users yet.cockpit-repositories
: add, remove, view repositories, change settings and refresh them. Does not work for unprivileged users yet.cockpit-packages
: show installed packages, search available repositories, install and uninstall packages. Requires administrative access. Be aware that there are no safety measures implemented as far as system usability goes.
Enhanced modules
cockpit-packagekit
: update packages from available repositories. The module now allows to individually select packages to update.
Upstream modules
cockpit
, cockpit-bridge
, cockpit-kdump
, cockpit-machines
, cockpit-networkmanager
, cockpit-podman
, cockpit-selinux
, cockpit-storaged
, cockpit-system
, cockpit-ws
: these modules are updated to the recent stable base version 332 (or their respective).
Default selection
Installation of the pattern cockpit
will pull in the following modules: cockpit
, cockpit-bridge
, cockpit-networkmanager
, cockpit-packagekit
, cockpit-packages
, cockpit-repos
, cockpit-selinux
, cockpit-storaged
, cockpit-subscriptions
, cockpit-system
, cockpit-ws
.
2.4.2 dovecot
2.4 configuration upgrade #
In SUSE Linux Enterprise Server 16.0 dovecot
has been upgraded to version 2.4.
The configuration of this version is incompatible with the previous versions.
Configuration has to be updated manually. For more information see https://doc.dovecot.org/2.4.0/installation/upgrade/2.3-to-2.4.html.
2.5 Changes affecting all architectures (Beta1) #
2.5.1 Disk configuration UI during installation #
Currently, choosing disk configurations other than "An existing disk" (installation to a single disk) suffer from poor usability. This is expected to change in a future update.
2.5.2 Non-functioning zypper
after installation #
There is currently a known issue that adds a non-functioning zypper
repository which prevents zypper
from working correctly.
To fix this issue, remove the repository in question and add the installation medium repository manually:
Remove repository with
zypper rr
. To remove the first repository, for example, run:zypper rr 1
.Add the installation medium as repository by running
zypper ar hd:/install?device=/dev/disk/by-label/agama-installer medium
(themedium
at the end is a name you want to give the repository).Run
zypper refresh
to refresh the added repository.
2.5.3 systemd uses cgroup v2 by default #
SUSE Linux Enterprise Server 16.0 uses cgroup v2 by default and v1 is unsupported. If you need to use cgroup v1, SLES 15 SP6 can be switched to hybrid mode using a boot parameter.
2.6 IBM Z-specific changes (s390x) #
2.6.1 parmfile
now points to ISO #
Previously, parmfile
would point to a directory of unpacked files.
Now it need to point to a loop-mounted ISO via FTP. For example:
root=live:ftp://$SERVER_URL/install/agama-online.iso agama.install_url=ftp://$SERVER_URL/install/agama
For more information see https://agama-project.github.io/docs/user/boot_options.
2.6.2 Disk selection UI problems during installation #
If you want to enable a disk, click on Storage in the left panel, then Install new system on and choose "storage techs".
Then you can choose a type of disk.
This can be avoided if you have defined your parmfile
as described in Section 2.6.1, “parmfile
now points to ISO”.
If you choose DASD, you should see disks based on your parmfile
and cio_ignore
configuration.
Then choose a disk and activate it by clicking Perform an action and then Activate.
This can take a moment.
If it is not visible, then you need to click on Storage or refresh the page.
In the zFCP section, after activating a disk a gray line will appear. This is just a visual bug, the disk will activate correctly.
2.6.3 Installation failure on zVM #
Due to a change from linuxrc
to dracut
, the parmfile
needs to define not only installation source but also a network and disks.
The parmfile
needs to be filled with a dracut
-like options, for example:
root=live:ftp://$SERVER_URL/install/online.iso ip=$IP_address::$IP_gateway:24:SLE16-Beta4:$NETWORK_DEVICE:none rd.zdev=qeth,0.0.0800:0.0.0801:0.0.0802,layer2=1,portno=0 cio_ignore=all,!condev,!0.0.0160 nameserver=$NAMEserverIP live.password=linux rd.zdev=dasd,0.0.0160
2.7 POWER-specific changes (ppc64le) #
Information in this section applies to SUSE Linux Enterprise Server for POWER 16.0.
2.7.1 KVM guests in LPAR #
The ability to run KVM Guests in an LPAR is a new feature in PowerVM Firmware 1060.10 release and supported in SUSE Linux Enterprise Server 16.0. This enables users to run KVM guests in a PowerVM LPAR bringing industry standard Linux KVM virtualization stack to IBM PowerVM, which easily integrates with existing Linux virtualization ecosystem. This enables a lot of interesting usecases which were earlier difficult to realize in a PowerVM LPAR.
KVM in a PowerVM LPAR is a new type of LPAR (logical partition) that allows the SUSE Linux Enterprise Server 16.0 kernel to host KVM guests inside an LPAR on PowerVM.
A KVM enabled LPAR allows standard Linux KVM tools (for example, virsh
) to create and manage lightweight Linux Virtual Machines (VM).
A KVM Linux LPAR uses dedicated cores which enables Linux to have full control of when Linux VMs are scheduled to run, just like KVM on other platforms.
2.8 Arm-specific changes (AArch64) #
2.8.1 System-on-Chip driver enablement #
SLES 16.0 includes driver enablement for the following System-on-Chip (SoC) chipsets:
Ampere* X-Gene*, eMAG*, Altra*, Altra Max, AmpereOne*
AWS* Graviton, Graviton2, Graviton3
Broadcom* BCM2837/BCM2710, BCM2711
Fujitsu* A64FX
Huawei* Kunpeng* 916, Kunpeng 920
Marvell* ThunderX*, ThunderX2*; OCTEON TX*; Armada* 7040, Armada 8040
NVIDIA* Grace; Tegra* X1, Tegra X2, Xavier*, Orin; BlueField*, BlueField-2, BlueField-3
NXP* i.MX 8M, 8M Mini; Layerscape* LS1012A, LS1027A/LS1017A, LS1028A/LS1018A, LS1043A, LS1046A, LS1088A, LS2080A/LS2040A, LS2088A, LX2160A
Rockchip RK3399
Socionext* SynQuacer* SC2A11
Xilinx* Zynq* UltraScale*+ MPSoC
Driver enablement is done as far as available and requested. Refer to the following sections for any known limitations.
Some systems might need additional drivers for external chips, such as a Power Management Integrated Chip (PMIC), which may differ between systems with the same SoC chipset.
For booting, systems need to fulfill either the Server Base Boot Requirements (SBBR)
or the Embedded Base Boot Requirements (EBBR),
that is, the Unified Extensible Firmware Interface (UEFI) either
implementing the Advanced Configuration and Power Interface (ACPI) or
providing a Flat Device Tree (FDT) table. If both are implemented, the kernel
will default to the Device Tree; the kernel command line argument acpi=force
can
override this default behavior.
Check for SUSE YES! certified systems, which have undergone compatibility testing.
2.9 Virtualization #
2.9.1 QEMU #
QEMU has been updated to version 10.0.0, full list of changes are available at https://wiki.qemu.org/ChangeLog/10.0
Highlights include: * Removed features: https://qemu-project.gitlab.io/qemu/about/removed-features.html * Deprecated features: https://qemu-project.gitlab.io/qemu/about/deprecated.html
2.9.2 libvirt #
libvirt
has been updated to version 11.3.0, this include many incremental improvements and bug fixes, see https://libvirt.org/news.html#v11-3-0-2025-05-02
libvirt
provides now a modular daemons.
2.9.3 VMware #
2.9.3.1 open-vm-tools #
open-vm-tools
has been updated to version 12.5.0 that addresses a few critical problems and bug fixes. See https://github.com/vmware/open-vm-tools/blob/stable-12.5.0/ReleaseNotes.md
2.9.4 Others #
2.9.4.1 libguestfs #
libguestfs
has been updated to version 1.55.13.
2.9.4.2 virt-v2v #
Update to version 2.7.16. As there is no release notes for check the code changes at: https://github.com/libguestfs/virt-v2v/tree/v2.7.16
Implement --parallel=N for parallel disk copies
Update Translations
Various fixes
2.9.4.3 sevctl
#
The sevctl
package has been updated to version 0.6.0.
2.9.4.4 snpguest
#
The snpguest
package has been updated to version 7.1.
2.9.4.5 virtiofsd
#
The virtiofsd
has been updated to 1.12.0.
2.9.4.6 virt-manager
#
virt-manager
is now shipped in version 5.0.0. Spice and XML editing are not available in this version. You should setup VNC for remote viewing and do all the XML editing using the virsh
command.
Full list of changes is available at https://github.com/virt-manager/virt-manager/releases/tag/v5.0.0
2.9.4.7 Intel TDX Confidential Computing #
We are pleased to announce that Kernel shipped in this release now incorporates the latest upstream Intel Trust Domain Extensions (TDX) patches. This significant update prepares the virtualization toolstack for Intel TDX confidential computing capabilities.
With these patches, the kernel is now ready to support the foundational requirements for creating and managing trust domains, a crucial step towards enabling confidential computing environments on Intel TDX-enabled hardware.
Important Note: While the kernel is now ready, the full Intel TDX confidential computing experience is not yet complete. Integration work is still in progress for the QEMU and Libvirt components. These elements are necessary to fully leverage and orchestrate Intel TDX features within your virtualized environments. We anticipate further updates in upcoming releases as these integrations are finalized.
2.10 Removed and deprecated features and packages #
This section lists features and packages that were removed from SUSE Linux Enterprise Server or will be removed in upcoming versions.
2.10.1 Removed features and packages #
The following features and packages have been removed in this release.
netiucv
andlcs
drivers
2.11 Deprecated features and packages #
The following features and packages are deprecated and will be removed in a future version of SUSE Linux Enterprise Server.
The 2MB OVMF image will be deprecated and removed in SUSE Linux Enterprise Server 16.1.
3 Obtaining source code #
This SUSE product includes materials licensed to SUSE under the GNU General Public License (GPL). The GPL requires SUSE to provide the source code that corresponds to the GPL-licensed material. The source code is available for download at https://www.suse.com/download/sles/ on Medium 2. For up to three years after distribution of the SUSE product, upon request, SUSE will mail a copy of the source code. Send requests by e-mail to sle_source_request@suse.com. SUSE may charge a reasonable fee to recover distribution costs.
4 Legal notices #
SUSE makes no representations or warranties with regard to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to revise this publication and to make changes to its content, at any time, without the obligation to notify any person or entity of such revisions or changes.
Further, SUSE makes no representations or warranties with regard to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, SUSE reserves the right to make changes to any and all parts of SUSE software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classifications to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical/biological weaponry end uses. Refer to https://www.suse.com/company/legal/ for more information on exporting SUSE software. SUSE assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2024-2025 SUSE LLC.
This release notes document is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License (CC-BY-ND-4.0). You should have received a copy of the license along with this document. If not, see https://creativecommons.org/licenses/by-nd/4.0/.
SUSE has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at https://www.suse.com/company/legal/ and one or more additional patents or pending patent applications in the U.S. and other countries.
For SUSE trademarks, see the SUSE Trademark and Service Mark list (https://www.suse.com/company/legal/). All third-party trademarks are the property of their respective owners.