openSUSE Security Announce
Threads by month
- ----- 2024 -----
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
April 2024
- 2 participants
- 83 discussions
SUSE-SU-2024:1204-1: important: Security update for tomcat10
by OPENSUSE-SECURITY-UPDATES 11 Apr '24
by OPENSUSE-SECURITY-UPDATES 11 Apr '24
11 Apr '24
# Security update for tomcat10
Announcement ID: SUSE-SU-2024:1204-1
Rating: important
References:
* bsc#1221385
* bsc#1221386
Cross-References:
* CVE-2024-23672
* CVE-2024-24549
CVSS scores:
* CVE-2024-23672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24549 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for tomcat10 fixes the following issues:
* CVE-2024-24549: Fixed denial of service during header validation for HTTP/2
stream (bsc#1221386)
* CVE-2024-23672: Fixed denial of service due to malicious WebSocket client
keeping connection open (bsc#1221385)
Other fixes: \- Update to Tomcat 10.1.20 * Catalina \+ Fix: Minor performance
improvement for building filter chains. Based on ideas from #702 by Luke Miao.
(remm) \+ Fix: Align error handling for Writer and OutputStream. Ensure use of
either once the response has been recycled triggers a NullPointerException
provided that discardFacades is configured with the default value of true.
(markt) \+ Fix: 68692: The standard thread pool implementations that are
configured using the Executor element now implement ExecutorService for better
support NIO2. (remm) \+ Fix: 68495: When restoring a saved POST request after a
successful FORM authentication, ensure that neither the URI, the query string
nor the protocol are corrupted when restoring the request body. (markt) \+ Fix:
After forwarding a request, attempt to unwrap the response in order to suspend
it, instead of simply closing it if it was wrapped. Add a new
suspendWrappedResponseAfterForward boolean attribute on Context to control the
bahavior, defaulting to false. (remm) \+ Fix: 68721: Workaround a possible cause
of duplicate class definitions when using ClassFileTransformers and the
transformation of a class also triggers the loading of the same class. (markt)
\+ Fix: The rewrite valve should not do a rewrite if the output is identical to
the input. (remm) \+ Update: Add a new valveSkip (or VS) rule flag to the
rewrite valve to allow skipping over the next valve in the Catalina pipeline.
(remm) \+ Update: Add highConcurrencyStatus attribute to the SemaphoreValve to
optionally allow the valve to return an error status code to the client when a
permit cannot be acquired from the semaphore. (remm) \+ Add: Add checking of the
"age" of the running Tomcat instance since its build-date to the
SecurityListener, and log a warning if the server is old. (schultz) \+ Fix: When
using the AsyncContext, throw an IllegalStateException, rather than allowing an
NullPointerException, if an attempt is made to use the AsyncContext after it has
been recycled. (markt) \+ Fix: Correct JPMS and OSGi meta-data for tomcat-embed-
core.jar by removing reference to org.apache.catalina.ssi package that is no
longer included in the JAR. Based on pull request #684 by Jendrik Johannes.
(markt) \+ Fix: Fix ServiceBindingPropertySource so that trailing \r\n sequences
are correctly removed from files containing property values when configured to
do so. Bug identified by Coverity Scan. (markt) \+ Add: Add improvements to the
CSRF prevention filter including the ability to skip adding nonces for resource
name and subtree URL patterns. (schultz) \+ Fix: Review usage of debug logging
and downgrade trace or data dumping operations from debug level to trace. (remm)
\+ Fix: 68089: Further improve the performance of request attribute access for
ApplicationHttpRequest and ApplicationRequest. (markt) \+ Fix: 68559: Allow
asynchronous error handling to write to the response after an error during
asynchronous processing. (markt) * Coyote \+ Fix: Improve the HTTP/2 stream
prioritisation process. If a stream uses all of the connection windows and still
has content to write, it will now be added to the backlog immediately rather
than waiting until the write attempt for the remaining content. (markt) \+ Fix:
Add threadsMaxIdleTime attribute to the endpoint, to allow configuring the
amount of time before an internal executor will scale back to the configured
minSpareThreads size. (remm) \+ Fix: Correct a regression in the support for
user provided SSLContext instances that broke the
org.apache.catalina.security.TLSCertificateReloadListener. (markt) \+ Fix:
Setting a null value for a cookie attribute should remove the attribute. (markt)
\+ Fix: Make asynchronous error handling more robust. Ensure that once a
connection is marked to be closed, further asynchronous processing cannot change
that. (markt) \+ Fix: Make asynchronous error handling more robust. Ensure that
once the call to AsyncListener.onError() has returned to the container, only
container threads can access the AsyncContext. This protects against various
race conditions that woudl otherwise occur if application threads continued to
access the AsyncContext. \+ Fix: Review usage of debug logging and downgrade
trace or data dumping operations from debug level to trace. In particular, most
of the HTTP/2 debug logging has been changed to trace level. (remm) \+ Fix: Add
support for user provided SSLContext instances configured on
SSLHostConfigCertificate instances. Based on pull request #673 provided by Hakan
Altındağ. (markt) \+ Fix: Partial fix for 68558: Cache the result of converting
to String for request URI, HTTP header names and the request Content-Type value
to improve performance by reducing repeated byte[] to String conversions.
(markt) \+ Fix: Improve error reporting to HTTP/2 clients for header processing
errors by reporting problems at the end of the frame where the error was
detected rather than at the end of the headers. (markt) \+ Fix: Remove the
remaining reference to a stream once the stream has been recycled. This makes
the stream eligible for garbage collection earlier and thereby improves
scalability. (markt) * Jasper \+ Add: Add support for specifying Java 22 (with
the value 22) as the compiler source and/or compiler target for JSP compilation.
If used with an Eclipse JDT compiler version that does not support these values,
a warning will be logged and the default will used. (markt) \+ Fix: Handle the
case where the JSP engine forwards a request/response to a Servlet that uses an
OutputStream rather than a Writer. This was triggering an IllegalStateException
on code paths where there was a subsequent attempt to obtain a Writer. (markt)
\+ Fix: Correctly handle the case where a tag library is packaged in a JAR file
and the web application is deployed as a WAR file rather than an unpacked
directory. (markt) \+ Fix: 68546: Generate optimal size and types for JSP
imports maps, as suggested by John Engebretson. (remm) \+ Fix: Review usage of
debug logging and downgrade trace or data dumping operations from debug level to
trace. (remm) * Cluster \+ Fix: Avoid updating request count stats on async.
(remm) * WebSocket \+ Fix: Correct a regression in the fix for 66508 that could
cause an UpgradeProcessor leak in some circumstances. (markt) \+ Fix: Review
usage of debug logging and downgrade trace or data dumping operations from debug
level to trace. (remm) \+ Fix: Ensure that WebSocket connection closure
completes if the connection is closed when the server side has used the
proprietary suspend/resume feature to suspend the connection. (markt) * Web
applications Add: Add support for responses in JSON format from the examples
application RequestHeaderExample. (schultz) * Other \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt) \+ Fix: 57130: Allow digest.(sh|bat) to accept password from a
file or stdin. (csutherl/schultz) \+ Update: Update Checkstyle to 10.14.1.
(markt) \+ Fix: Correct the remaining OSGi contract references in the manifest
files to refer to the Jakarta EE contract names rather than the Java EE contract
names. Based on pull request #685 provided by Paul A. Nicolucci. (markt) \+
Update: Update Checkstyle to 10.13.0. (markt) \+ Update: Update JSign to 6.0.
(markt) \+ Update: Update the packaged version of the Tomcat Migration Tool for
Jakarta EE to 1.0.7. (markt) \+ Update: Update Tomcat Native to 2.0.7. (markt)
\+ Update: Add strings for debug level messages. (remm) \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1204=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1204=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-embed-10.1.20-150200.5.22.2
* tomcat10-jsvc-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2
* tomcat10-docs-webapp-10.1.20-150200.5.22.2
* Web and Scripting Module 15-SP5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2
## References:
* https://www.suse.com/security/cve/CVE-2024-23672.html
* https://www.suse.com/security/cve/CVE-2024-24549.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221385
* https://bugzilla.suse.com/show_bug.cgi?id=1221386
1
0
openSUSE-SU-2024:0106-1: moderate: Security update for sngrep
by opensuse-securityďĽ opensuse.org 10 Apr '24
by opensuse-securityďĽ opensuse.org 10 Apr '24
10 Apr '24
openSUSE Security Update: Security update for sngrep
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0106-1
Rating: moderate
References:
Cross-References: CVE-2024-3119 CVE-2024-3120
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for sngrep fixes the following issues:
- Update to version 1.8.1
* Fix CVE-2024-3119: sngrep: buffer overflow due to improper handling of
'Call-ID' and 'X-Call-ID' SIP headers.
* Fix CVE-2024-3120: sngrep: stack-buffer overflow due to inadequate
bounds checking when copying 'Content-Length' and 'Warning' headers
into fixed-size buffers.
- Update to versino 1.8.0
* fix typo in message, thanks to lintian.
* fix compiler warnings about unused variables.
* Fixed a typo in comment line in filter.c
* Redefine usage of POSIX signals.
* Support for building sngrep using CMake added.
- Update to version 1.7.0
* save: add option --text to save captured data to plain text
* capture: fix memory overflows while parsing IP headers
* hep: fix hep listener enabled in offline mode
* core: stop sngrep when parent process has ended
* ssl: fix decrypt with AES256 GCM SHA384 cipher
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-106=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
sngrep-1.8.1-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-3119.html
https://www.suse.com/security/cve/CVE-2024-3120.html
1
0
10 Apr '24
# Security update for less
Announcement ID: SUSE-SU-2024:1192-1
Rating: important
References:
* bsc#1219901
Cross-References:
* CVE-2022-48624
CVSS scores:
* CVE-2022-48624 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for less fixes the following issues:
* CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell
metacharacters (bsc#1219901).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1192=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1192=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1192=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1192=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1192=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1192=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1192=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1192=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1192=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1192=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1192=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
## References:
* https://www.suse.com/security/cve/CVE-2022-48624.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219901
1
0
09 Apr '24
# Security update for qt6-base
Announcement ID: SUSE-SU-2024:1174-1
Rating: moderate
References:
* bsc#1221926
Cross-References:
* CVE-2024-30161
CVSS scores:
* CVE-2024-30161 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for qt6-base fixes the following issues:
* CVE-2024-30161: Fixed QNetworkReply header data access via a dangling
pointer (bsc#1221926).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1174=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1174=1 openSUSE-SLE-15.5-2024-1174=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1174=1
## Package List:
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* SUSE Package Hub 15 15-SP5 (noarch)
* qt6-base-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-printsupport-cups-debuginfo-6.4.2-150500.3.17.1
* qt6-test-private-devel-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-printsupport-cups-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-6.4.2-150500.3.17.1
* qt6-base-docs-html-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* qt6-platformsupport-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* qt6-sql-private-devel-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* qt6-printsupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-docs-qch-6.4.2-150500.3.17.1
* qt6-sql-mysql-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-private-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-sql-mysql-debuginfo-6.4.2-150500.3.17.1
* qt6-xml-private-devel-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-private-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (noarch)
* qt6-base-private-devel-6.4.2-150500.3.17.1
* qt6-base-devel-6.4.2-150500.3.17.1
* qt6-docs-common-6.4.2-150500.3.17.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30161.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221926
1
0
SUSE-SU-2024:1169-1: important: Security update for util-linux
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
09 Apr '24
# Security update for util-linux
Announcement ID: SUSE-SU-2024:1169-1
Rating: important
References:
* bsc#1207987
* bsc#1220117
* bsc#1221831
Cross-References:
* CVE-2024-28085
CVSS scores:
* CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for util-linux fixes the following issues:
* CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1169=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1169=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1169=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1169=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1169=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1169=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1169=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1169=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1169=1
## Package List:
* SUSE Manager Proxy 4.3 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Proxy 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libmount-devel-static-2.37.2-150400.8.29.1
* libsmartcols-devel-static-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk-devel-static-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-debugsource-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libmount-devel-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libblkid-devel-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libfdisk-devel-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libsmartcols1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-32bit-2.37.2-150400.8.29.1
* libuuid-devel-32bit-2.37.2-150400.8.29.1
* libfdisk1-32bit-2.37.2-150400.8.29.1
* libfdisk1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-32bit-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libuuid1-64bit-debuginfo-2.37.2-150400.8.29.1
* libfdisk-devel-64bit-2.37.2-150400.8.29.1
* libsmartcols1-64bit-2.37.2-150400.8.29.1
* libmount1-64bit-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-64bit-2.37.2-150400.8.29.1
* libblkid1-64bit-2.37.2-150400.8.29.1
* libmount-devel-64bit-2.37.2-150400.8.29.1
* libuuid-devel-64bit-2.37.2-150400.8.29.1
* libsmartcols1-64bit-debuginfo-2.37.2-150400.8.29.1
* libblkid1-64bit-debuginfo-2.37.2-150400.8.29.1
* libblkid-devel-64bit-2.37.2-150400.8.29.1
* libmount1-64bit-2.37.2-150400.8.29.1
* libfdisk1-64bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-64bit-2.37.2-150400.8.29.1
* libsmartcols-devel-64bit-2.37.2-150400.8.29.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207987
* https://bugzilla.suse.com/show_bug.cgi?id=1220117
* https://bugzilla.suse.com/show_bug.cgi?id=1221831
1
0
SUSE-SU-2024:1170-1: important: Security update for util-linux
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
09 Apr '24
# Security update for util-linux
Announcement ID: SUSE-SU-2024:1170-1
Rating: important
References:
* bsc#1194038
* bsc#1207987
* bsc#1221831
Cross-References:
* CVE-2024-28085
CVSS scores:
* CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for util-linux fixes the following issues:
* CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1170=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1170=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1170=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1170=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1170=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1170=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1170=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* python3-libmount-debugsource-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* python3-libmount-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-static-2.36.2-150300.4.41.1
* libsmartcols-devel-static-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* python3-libmount-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libmount-devel-static-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-32bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-32bit-2.36.2-150300.4.41.1
* libuuid-devel-32bit-2.36.2-150300.4.41.1
* libblkid-devel-32bit-2.36.2-150300.4.41.1
* libsmartcols-devel-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libmount-devel-32bit-2.36.2-150300.4.41.1
* libfdisk1-32bit-2.36.2-150300.4.41.1
* libfdisk1-32bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libmount-devel-64bit-2.36.2-150300.4.41.1
* libsmartcols1-64bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-64bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-64bit-2.36.2-150300.4.41.1
* libuuid1-64bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-64bit-2.36.2-150300.4.41.1
* libuuid1-64bit-2.36.2-150300.4.41.1
* libfdisk1-64bit-2.36.2-150300.4.41.1
* libblkid-devel-64bit-2.36.2-150300.4.41.1
* libuuid-devel-64bit-2.36.2-150300.4.41.1
* libblkid1-64bit-2.36.2-150300.4.41.1
* libmount1-64bit-2.36.2-150300.4.41.1
* libsmartcols-devel-64bit-2.36.2-150300.4.41.1
* libblkid1-64bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-64bit-debuginfo-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194038
* https://bugzilla.suse.com/show_bug.cgi?id=1207987
* https://bugzilla.suse.com/show_bug.cgi?id=1221831
1
0
SUSE-SU-2024:1172-1: important: Security update for util-linux
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
by OPENSUSE-SECURITY-UPDATES 09 Apr '24
09 Apr '24
# Security update for util-linux
Announcement ID: SUSE-SU-2024:1172-1
Rating: important
References:
* bsc#1207987
* bsc#1221831
Cross-References:
* CVE-2024-28085
CVSS scores:
* CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for util-linux fixes the following issues:
* CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1172=1 openSUSE-SLE-15.5-2024-1172=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1172=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1172=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1172=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libmount-devel-static-2.37.4-150500.9.6.1
* libblkid1-debuginfo-2.37.4-150500.9.6.1
* libfdisk1-2.37.4-150500.9.6.1
* libfdisk-devel-static-2.37.4-150500.9.6.1
* libuuid-devel-static-2.37.4-150500.9.6.1
* libsmartcols1-debuginfo-2.37.4-150500.9.6.1
* util-linux-systemd-debuginfo-2.37.4-150500.9.6.1
* uuidd-2.37.4-150500.9.6.1
* libuuid1-2.37.4-150500.9.6.1
* python3-libmount-2.37.4-150500.9.6.1
* python3-libmount-debugsource-2.37.4-150500.9.6.1
* libuuid-devel-2.37.4-150500.9.6.1
* util-linux-2.37.4-150500.9.6.1
* util-linux-debuginfo-2.37.4-150500.9.6.1
* libfdisk1-debuginfo-2.37.4-150500.9.6.1
* libuuid1-debuginfo-2.37.4-150500.9.6.1
* uuidd-debuginfo-2.37.4-150500.9.6.1
* libmount1-debuginfo-2.37.4-150500.9.6.1
* util-linux-debugsource-2.37.4-150500.9.6.1
* util-linux-systemd-2.37.4-150500.9.6.1
* util-linux-systemd-debugsource-2.37.4-150500.9.6.1
* libsmartcols1-2.37.4-150500.9.6.1
* libsmartcols-devel-2.37.4-150500.9.6.1
* libblkid-devel-2.37.4-150500.9.6.1
* python3-libmount-debuginfo-2.37.4-150500.9.6.1
* libsmartcols-devel-static-2.37.4-150500.9.6.1
* libblkid-devel-static-2.37.4-150500.9.6.1
* libblkid1-2.37.4-150500.9.6.1
* libfdisk-devel-2.37.4-150500.9.6.1
* libmount1-2.37.4-150500.9.6.1
* libmount-devel-2.37.4-150500.9.6.1
* openSUSE Leap 15.5 (x86_64)
* libmount1-32bit-debuginfo-2.37.4-150500.9.6.1
* libuuid-devel-32bit-2.37.4-150500.9.6.1
* libfdisk1-32bit-2.37.4-150500.9.6.1
* libmount-devel-32bit-2.37.4-150500.9.6.1
* libsmartcols1-32bit-debuginfo-2.37.4-150500.9.6.1
* libfdisk-devel-32bit-2.37.4-150500.9.6.1
* libmount1-32bit-2.37.4-150500.9.6.1
* libsmartcols1-32bit-2.37.4-150500.9.6.1
* libblkid1-32bit-debuginfo-2.37.4-150500.9.6.1
* libblkid-devel-32bit-2.37.4-150500.9.6.1
* libuuid1-32bit-2.37.4-150500.9.6.1
* libsmartcols-devel-32bit-2.37.4-150500.9.6.1
* libblkid1-32bit-2.37.4-150500.9.6.1
* libuuid1-32bit-debuginfo-2.37.4-150500.9.6.1
* libfdisk1-32bit-debuginfo-2.37.4-150500.9.6.1
* openSUSE Leap 15.5 (noarch)
* util-linux-lang-2.37.4-150500.9.6.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libsmartcols-devel-64bit-2.37.4-150500.9.6.1
* libmount-devel-64bit-2.37.4-150500.9.6.1
* libsmartcols1-64bit-2.37.4-150500.9.6.1
* libblkid1-64bit-debuginfo-2.37.4-150500.9.6.1
* libmount1-64bit-2.37.4-150500.9.6.1
* libfdisk1-64bit-2.37.4-150500.9.6.1
* libblkid1-64bit-2.37.4-150500.9.6.1
* libuuid1-64bit-debuginfo-2.37.4-150500.9.6.1
* libuuid1-64bit-2.37.4-150500.9.6.1
* libblkid-devel-64bit-2.37.4-150500.9.6.1
* libfdisk1-64bit-debuginfo-2.37.4-150500.9.6.1
* libuuid-devel-64bit-2.37.4-150500.9.6.1
* libfdisk-devel-64bit-2.37.4-150500.9.6.1
* libmount1-64bit-debuginfo-2.37.4-150500.9.6.1
* libsmartcols1-64bit-debuginfo-2.37.4-150500.9.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* util-linux-systemd-debugsource-2.37.4-150500.9.6.1
* libsmartcols1-2.37.4-150500.9.6.1
* libmount1-debuginfo-2.37.4-150500.9.6.1
* libfdisk1-debuginfo-2.37.4-150500.9.6.1
* libsmartcols1-debuginfo-2.37.4-150500.9.6.1
* util-linux-systemd-debuginfo-2.37.4-150500.9.6.1
* libuuid1-debuginfo-2.37.4-150500.9.6.1
* libuuid1-2.37.4-150500.9.6.1
* libblkid1-debuginfo-2.37.4-150500.9.6.1
* libblkid1-2.37.4-150500.9.6.1
* util-linux-debuginfo-2.37.4-150500.9.6.1
* util-linux-debugsource-2.37.4-150500.9.6.1
* libfdisk1-2.37.4-150500.9.6.1
* libmount1-2.37.4-150500.9.6.1
* util-linux-systemd-2.37.4-150500.9.6.1
* util-linux-2.37.4-150500.9.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libblkid1-2.37.4-150500.9.6.1
* libblkid1-debuginfo-2.37.4-150500.9.6.1
* libfdisk1-2.37.4-150500.9.6.1
* libuuid-devel-static-2.37.4-150500.9.6.1
* libsmartcols1-debuginfo-2.37.4-150500.9.6.1
* util-linux-systemd-debuginfo-2.37.4-150500.9.6.1
* libuuid1-2.37.4-150500.9.6.1
* libuuid-devel-2.37.4-150500.9.6.1
* util-linux-debuginfo-2.37.4-150500.9.6.1
* util-linux-2.37.4-150500.9.6.1
* libfdisk1-debuginfo-2.37.4-150500.9.6.1
* libuuid1-debuginfo-2.37.4-150500.9.6.1
* libmount1-debuginfo-2.37.4-150500.9.6.1
* util-linux-debugsource-2.37.4-150500.9.6.1
* util-linux-systemd-2.37.4-150500.9.6.1
* util-linux-systemd-debugsource-2.37.4-150500.9.6.1
* libsmartcols1-2.37.4-150500.9.6.1
* libsmartcols-devel-2.37.4-150500.9.6.1
* libblkid-devel-static-2.37.4-150500.9.6.1
* libblkid-devel-2.37.4-150500.9.6.1
* libfdisk-devel-2.37.4-150500.9.6.1
* libmount1-2.37.4-150500.9.6.1
* libmount-devel-2.37.4-150500.9.6.1
* Basesystem Module 15-SP5 (noarch)
* util-linux-lang-2.37.4-150500.9.6.1
* Basesystem Module 15-SP5 (x86_64)
* libmount1-32bit-debuginfo-2.37.4-150500.9.6.1
* libmount1-32bit-2.37.4-150500.9.6.1
* libblkid1-32bit-debuginfo-2.37.4-150500.9.6.1
* libuuid1-32bit-2.37.4-150500.9.6.1
* libblkid1-32bit-2.37.4-150500.9.6.1
* libuuid1-32bit-debuginfo-2.37.4-150500.9.6.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* util-linux-systemd-debugsource-2.37.4-150500.9.6.1
* uuidd-debuginfo-2.37.4-150500.9.6.1
* util-linux-systemd-debuginfo-2.37.4-150500.9.6.1
* uuidd-2.37.4-150500.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207987
* https://bugzilla.suse.com/show_bug.cgi?id=1221831
1
0
SUSE-SU-2024:1163-1: moderate: Security update for kubernetes1.23
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1163-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1163=1 openSUSE-SLE-15.5-2024-1163=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1163=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-apiserver-1.23.17-150500.3.9.1
* kubernetes1.23-client-1.23.17-150500.3.9.1
* kubernetes1.23-proxy-1.23.17-150500.3.9.1
* kubernetes1.23-scheduler-1.23.17-150500.3.9.1
* kubernetes1.23-kubeadm-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-1.23.17-150500.3.9.1
* kubernetes1.23-controller-manager-1.23.17-150500.3.9.1
* kubernetes1.23-client-common-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-common-1.23.17-150500.3.9.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.23-client-fish-completion-1.23.17-150500.3.9.1
* kubernetes1.23-client-bash-completion-1.23.17-150500.3.9.1
* openSUSE Leap 15.5 (ppc64le)
* kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.9.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-client-1.23.17-150500.3.9.1
* kubernetes1.23-client-common-1.23.17-150500.3.9.1
* Containers Module 15-SP5 (ppc64le)
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
SUSE-SU-2024:1164-1: moderate: Security update for kubernetes1.23
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1164-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1164=1 openSUSE-SLE-15.5-2024-1164=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1164=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-client-1.24.17-150500.3.13.1
* kubernetes1.24-kubeadm-1.24.17-150500.3.13.1
* kubernetes1.24-kubelet-common-1.24.17-150500.3.13.1
* kubernetes1.24-kubelet-1.24.17-150500.3.13.1
* kubernetes1.24-controller-manager-1.24.17-150500.3.13.1
* kubernetes1.24-client-common-1.24.17-150500.3.13.1
* kubernetes1.24-apiserver-1.24.17-150500.3.13.1
* kubernetes1.24-proxy-1.24.17-150500.3.13.1
* kubernetes1.24-scheduler-1.24.17-150500.3.13.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.24-client-bash-completion-1.24.17-150500.3.13.1
* kubernetes1.24-client-fish-completion-1.24.17-150500.3.13.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-client-1.24.17-150500.3.13.1
* kubernetes1.24-client-common-1.24.17-150500.3.13.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
SUSE-SU-2024:1166-1: moderate: Security update for kubernetes1.23
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1166-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* Upgrade from v1.26.9 to v1.26.14
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1166=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1166=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1166=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
* kubernetes1.26-proxy-1.26.14-150400.9.6.1
* kubernetes1.26-controller-manager-1.26.14-150400.9.6.1
* kubernetes1.26-kubelet-1.26.14-150400.9.6.1
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-kubeadm-1.26.14-150400.9.6.1
* kubernetes1.26-scheduler-1.26.14-150400.9.6.1
* kubernetes1.26-apiserver-1.26.14-150400.9.6.1
* kubernetes1.26-kubelet-common-1.26.14-150400.9.6.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.26-client-bash-completion-1.26.14-150400.9.6.1
* kubernetes1.26-client-fish-completion-1.26.14-150400.9.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
08 Apr '24
# Security update for nghttp2
Announcement ID: SUSE-SU-2024:1167-1
Rating: important
References:
* bsc#1221399
Cross-References:
* CVE-2024-28182
CVSS scores:
* CVE-2024-28182 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for nghttp2 fixes the following issues:
* CVE-2024-28182: Fixed denial of service via http/2 continuation frames
(bsc#1221399)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1167=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1167=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1167=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1167=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1167=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1167=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1167=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1167=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1167=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1167=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1167=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1167=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1167=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1167=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* nghttp2-python-debugsource-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* python3-nghttp2-1.40.0-150200.17.1
* python3-nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* openSUSE Leap 15.5 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2_asio1-32bit-1.40.0-150200.17.1
* libnghttp2_asio1-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* Basesystem Module 15-SP5 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Manager Proxy 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Server 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28182.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221399
1
0
08 Apr '24
# Security update for libvirt
Announcement ID: SUSE-SU-2024:1100-1
Rating: moderate
References:
* bsc#1221749
* bsc#1221815
Cross-References:
* CVE-2024-2494
CVSS scores:
* CVE-2024-2494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for libvirt fixes the following issues:
* CVE-2024-2494: Add a check for negative array lengths before allocation to
prevent potential DoS. (bsc#1221815)
The following non-security bug was fixed:
* Avoid memleak in virNodeDeviceGetPCIVPDDynamicCap() (bsc#1221749).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1100=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1100=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1100=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1100=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1100=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1100=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1100=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1100=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1100=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libvirt-daemon-driver-lxc-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-lxc-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* wireshark-plugin-libvirt-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-gluster-8.0.0-150400.7.11.2
* wireshark-plugin-libvirt-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-gluster-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-lxc-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (x86_64)
* libvirt-client-32bit-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-32bit-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libvirt-client-64bit-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-64bit-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* SUSE Manager Proxy 4.3 (x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Proxy 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (x86_64)
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
## References:
* https://www.suse.com/security/cve/CVE-2024-2494.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221749
* https://bugzilla.suse.com/show_bug.cgi?id=1221815
1
0
08 Apr '24
# Security update for xen
Announcement ID: SUSE-SU-2024:1101-1
Rating: moderate
References:
* bsc#1221332
* bsc#1221334
Cross-References:
* CVE-2023-28746
* CVE-2024-2193
CVSS scores:
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-2193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-28746: Register File Data Sampling (bsc#1221332)
* CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1101=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1101=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1101=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1101=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1101=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1101=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1101=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-tools-domU-4.16.5_14-150400.4.52.1
* xen-tools-domU-debuginfo-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-devel-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (x86_64)
* xen-libs-32bit-4.16.5_14-150400.4.52.1
* xen-libs-32bit-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* xen-doc-html-4.16.5_14-150400.4.52.1
* xen-4.16.5_14-150400.4.52.1
* xen-tools-4.16.5_14-150400.4.52.1
* xen-tools-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (noarch)
* xen-tools-xendomains-wait-disk-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* xen-libs-64bit-4.16.5_14-150400.4.52.1
* xen-libs-64bit-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap Micro 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap Micro 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2024-2193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221332
* https://bugzilla.suse.com/show_bug.cgi?id=1221334
1
0
08 Apr '24
# Security update for xen
Announcement ID: SUSE-SU-2024:1102-1
Rating: moderate
References:
* bsc#1027519
* bsc#1219885
* bsc#1221332
* bsc#1221334
Cross-References:
* CVE-2023-28746
* CVE-2023-46841
* CVE-2024-2193
CVSS scores:
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-46841 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-2193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-28746: Register File Data Sampling (bsc#1221332)
* CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
* CVE-2023-46841: Hhadow stack vs exceptions from emulation stubs
(bsc#1219885)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1102=1 SUSE-2024-1102=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1102=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1102=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1102=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* xen-libs-4.17.3_08-150500.3.27.1
* xen-devel-4.17.3_08-150500.3.27.1
* xen-debugsource-4.17.3_08-150500.3.27.1
* xen-tools-domU-debuginfo-4.17.3_08-150500.3.27.1
* xen-tools-domU-4.17.3_08-150500.3.27.1
* xen-libs-debuginfo-4.17.3_08-150500.3.27.1
* openSUSE Leap 15.5 (x86_64)
* xen-libs-32bit-debuginfo-4.17.3_08-150500.3.27.1
* xen-libs-32bit-4.17.3_08-150500.3.27.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* xen-tools-4.17.3_08-150500.3.27.1
* xen-4.17.3_08-150500.3.27.1
* xen-doc-html-4.17.3_08-150500.3.27.1
* xen-tools-debuginfo-4.17.3_08-150500.3.27.1
* openSUSE Leap 15.5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.3_08-150500.3.27.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* xen-libs-64bit-4.17.3_08-150500.3.27.1
* xen-libs-64bit-debuginfo-4.17.3_08-150500.3.27.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* xen-debugsource-4.17.3_08-150500.3.27.1
* xen-libs-debuginfo-4.17.3_08-150500.3.27.1
* xen-libs-4.17.3_08-150500.3.27.1
* Basesystem Module 15-SP5 (x86_64)
* xen-libs-4.17.3_08-150500.3.27.1
* xen-debugsource-4.17.3_08-150500.3.27.1
* xen-tools-domU-debuginfo-4.17.3_08-150500.3.27.1
* xen-tools-domU-4.17.3_08-150500.3.27.1
* xen-libs-debuginfo-4.17.3_08-150500.3.27.1
* Server Applications Module 15-SP5 (x86_64)
* xen-devel-4.17.3_08-150500.3.27.1
* xen-4.17.3_08-150500.3.27.1
* xen-debugsource-4.17.3_08-150500.3.27.1
* xen-tools-4.17.3_08-150500.3.27.1
* xen-tools-debuginfo-4.17.3_08-150500.3.27.1
* Server Applications Module 15-SP5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.3_08-150500.3.27.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-46841.html
* https://www.suse.com/security/cve/CVE-2024-2193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1027519
* https://bugzilla.suse.com/show_bug.cgi?id=1219885
* https://bugzilla.suse.com/show_bug.cgi?id=1221332
* https://bugzilla.suse.com/show_bug.cgi?id=1221334
1
0
08 Apr '24
# Security update for qemu
Announcement ID: SUSE-SU-2024:1103-1
Rating: important
References:
* bsc#1205316
* bsc#1209554
* bsc#1218484
* bsc#1220062
* bsc#1220065
* bsc#1220134
* jsc#PED-7366
* jsc#PED-8113
Cross-References:
* CVE-2023-1544
* CVE-2023-6693
* CVE-2024-24474
* CVE-2024-26327
* CVE-2024-26328
CVSS scores:
* CVE-2023-1544 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H
* CVE-2023-1544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
* CVE-2023-6693 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-6693 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-24474 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-26327 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-26328 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves five vulnerabilities, contains two features and has one
security fix can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-26327: Fixed buffer overflow via invalid SR/IOV NumVFs value
(bsc#1220062).
* CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI
command (bsc#1220134).
* CVE-2023-6693: Fixed stack buffer overflow in virtio_net_flush_tx()
(bsc#1218484).
* CVE-2023-1544: Fixed out-of-bounds read in pvrdma_ring_next_elem_read()
(bsc#1209554).
* CVE-2024-26328: Fixed invalid NumVFs value handled in NVME SR/IOV
implementation (bsc#1220065).
The following non-security bug was fixed:
* Removing in-use mediated device should fail with error message instead of
hang (bsc#1205316).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1103=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1103=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1103=1 openSUSE-SLE-15.5-2024-1103=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1103=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1103=1
## Package List:
* SUSE Package Hub 15 15-SP5 (noarch)
* qemu-microvm-7.1.0-150500.49.12.1
* qemu-sgabios-8-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-block-nfs-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.12.1
* qemu-extra-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-7.1.0-150500.49.12.1
* qemu-audio-oss-7.1.0-150500.49.12.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-7.1.0-150500.49.12.1
* qemu-audio-jack-7.1.0-150500.49.12.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.12.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-7.1.0-150500.49.12.1
* qemu-block-gluster-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le)
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x x86_64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (s390x)
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.12.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.12.1
* qemu-block-rbd-7.1.0-150500.49.12.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-dbus-7.1.0-150500.49.12.1
* qemu-lang-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-block-iscsi-7.1.0-150500.49.12.1
* qemu-ksm-7.1.0-150500.49.12.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-7.1.0-150500.49.12.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-ui-curses-7.1.0-150500.49.12.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-7.1.0-150500.49.12.1
* qemu-chardev-baum-7.1.0-150500.49.12.1
* qemu-block-ssh-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le x86_64)
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (noarch)
* qemu-sgabios-8-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (ppc64le)
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-kvm-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (s390x)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (x86_64)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-dbus-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-block-iscsi-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-ksm-7.1.0-150500.49.12.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-7.1.0-150500.49.12.1
* qemu-ui-curses-7.1.0-150500.49.12.1
* qemu-arm-7.1.0-150500.49.12.1
* qemu-audio-oss-7.1.0-150500.49.12.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* qemu-ui-dbus-7.1.0-150500.49.12.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-block-nfs-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-x86-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-debugsource-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.12.1
* qemu-chardev-baum-7.1.0-150500.49.12.1
* qemu-block-gluster-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-lang-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.12.1
* qemu-headless-7.1.0-150500.49.12.1
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-7.1.0-150500.49.12.1
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* qemu-audio-jack-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (s390x x86_64 i586)
* qemu-kvm-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (noarch)
* qemu-microvm-7.1.0-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-sgabios-8-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-7.1.0-150500.49.12.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-sgabios-8-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
## References:
* https://www.suse.com/security/cve/CVE-2023-1544.html
* https://www.suse.com/security/cve/CVE-2023-6693.html
* https://www.suse.com/security/cve/CVE-2024-24474.html
* https://www.suse.com/security/cve/CVE-2024-26327.html
* https://www.suse.com/security/cve/CVE-2024-26328.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1209554
* https://bugzilla.suse.com/show_bug.cgi?id=1218484
* https://bugzilla.suse.com/show_bug.cgi?id=1220062
* https://bugzilla.suse.com/show_bug.cgi?id=1220065
* https://bugzilla.suse.com/show_bug.cgi?id=1220134
* https://jira.suse.com/browse/PED-7366
* https://jira.suse.com/browse/PED-8113
1
0
08 Apr '24
# Security update for ncurses
Announcement ID: SUSE-SU-2024:1133-1
Rating: moderate
References:
* bsc#1220061
Cross-References:
* CVE-2023-45918
CVSS scores:
* CVE-2023-45918 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for ncurses fixes the following issues:
* CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color
file (bsc#1220061).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1133=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1133=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1133=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1133=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1133=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1133=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1133=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1133=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-1133=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1133=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1133=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* openSUSE Leap 15.5 (x86_64)
* ncurses-devel-32bit-debuginfo-6.1-150000.5.24.1
* libncurses5-32bit-debuginfo-6.1-150000.5.24.1
* ncurses5-devel-32bit-6.1-150000.5.24.1
* libncurses5-32bit-6.1-150000.5.24.1
* ncurses-devel-32bit-6.1-150000.5.24.1
* libncurses6-32bit-debuginfo-6.1-150000.5.24.1
* libncurses6-32bit-6.1-150000.5.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ncurses-devel-6.1-150000.5.24.1
* ncurses5-devel-6.1-150000.5.24.1
* tack-debuginfo-6.1-150000.5.24.1
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* tack-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* libncurses5-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* libncurses5-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* ncurses-devel-debuginfo-6.1-150000.5.24.1
* terminfo-iterm-6.1-150000.5.24.1
* terminfo-screen-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ncurses-devel-6.1-150000.5.24.1
* terminfo-base-6.1-150000.5.24.1
* tack-debuginfo-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* tack-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* ncurses-devel-debuginfo-6.1-150000.5.24.1
* terminfo-iterm-6.1-150000.5.24.1
* terminfo-screen-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* Basesystem Module 15-SP5 (x86_64)
* libncurses6-32bit-debuginfo-6.1-150000.5.24.1
* libncurses6-32bit-6.1-150000.5.24.1
* Development Tools Module 15-SP5 (x86_64)
* ncurses-devel-32bit-debuginfo-6.1-150000.5.24.1
* ncurses-devel-32bit-6.1-150000.5.24.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses5-debuginfo-6.1-150000.5.24.1
* ncurses5-devel-6.1-150000.5.24.1
* libncurses5-6.1-150000.5.24.1
* Legacy Module 15-SP5 (x86_64)
* libncurses5-32bit-debuginfo-6.1-150000.5.24.1
* libncurses5-32bit-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45918.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220061
1
0
08 Apr '24
# Security update for c-ares
Announcement ID: SUSE-SU-2024:1136-1
Rating: moderate
References:
* bsc#1220279
Cross-References:
* CVE-2024-25629
CVSS scores:
* CVE-2024-25629 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for c-ares fixes the following issues:
* CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1136=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1136=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1136=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1136=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1136=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1136=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1136=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1136=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1136=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* c-ares-utils-debuginfo-1.19.1-150000.3.26.1
* c-ares-utils-1.19.1-150000.3.26.1
* c-ares-devel-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* c-ares-debugsource-1.19.1-150000.3.26.1
* openSUSE Leap 15.5 (x86_64)
* libcares2-32bit-1.19.1-150000.3.26.1
* libcares2-32bit-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* c-ares-devel-1.19.1-150000.3.26.1
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25629.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220279
1
0
08 Apr '24
# Security update for helm
Announcement ID: SUSE-SU-2024:1137-1
Rating: moderate
References:
* bsc#1219969
* bsc#1220207
Cross-References:
* CVE-2024-25620
* CVE-2024-26147
CVSS scores:
* CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for helm fixes the following issues:
* CVE-2024-25620: Fixed with dependency management path traversal
(bsc#1219969).
* CVE-2024-26147: Fixed uninitialized variable in yaml parsing (bsc#1220207).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1137=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1137=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1137=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* helm-3.13.3-150000.1.32.1
* helm-debuginfo-3.13.3-150000.1.32.1
* openSUSE Leap 15.5 (noarch)
* helm-zsh-completion-3.13.3-150000.1.32.1
* helm-bash-completion-3.13.3-150000.1.32.1
* helm-fish-completion-3.13.3-150000.1.32.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* helm-3.13.3-150000.1.32.1
* helm-debuginfo-3.13.3-150000.1.32.1
* Containers Module 15-SP5 (noarch)
* helm-zsh-completion-3.13.3-150000.1.32.1
* helm-bash-completion-3.13.3-150000.1.32.1
* SUSE Package Hub 15 15-SP5 (noarch)
* helm-fish-completion-3.13.3-150000.1.32.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25620.html
* https://www.suse.com/security/cve/CVE-2024-26147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219969
* https://bugzilla.suse.com/show_bug.cgi?id=1220207
1
0
SUSE-SU-2024:1139-1: moderate: Security update for ucode-intel
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
by OPENSUSE-SECURITY-UPDATES 08 Apr '24
08 Apr '24
# Security update for ucode-intel
Announcement ID: SUSE-SU-2024:1139-1
Rating: moderate
References:
* bsc#1221323
Cross-References:
* CVE-2023-22655
* CVE-2023-28746
* CVE-2023-38575
* CVE-2023-39368
* CVE-2023-43490
CVSS scores:
* CVE-2023-22655 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-39368 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-43490 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for ucode-intel fixes the following issues:
* Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)
* CVE-2023-39368: Protection mechanism failure of bus lock regulator for some
Intel Processors may allow an unauthenticated user to potentially enable
denial of service via network access
* CVE-2023-38575: Non-transparent sharing of return predictor targets between
contexts in some Intel Processors may allow an authorized user to
potentially enable information disclosure via local access.
* CVE-2023-28746: Information exposure through microarchitectural state after
transient execution from some register files for some Intel Atom Processors
may allow an authenticated user to potentially enable information disclosure
via local access.
* CVE-2023-22655 Protection mechanism failure in some 3rd and 4th Generation
Intel Xeon Processors when using Intel SGX or Intel TDX may allow a
privileged user to potentially enable escalation of privilege via local
access.
* CVE-2023-43490: Incorrect calculation in microcode keying mechanism for some
Intel Xeon D Processors with Intel® SGX may allow a privileged user to
potentially enable information disclosure via local access.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1139=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1139=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1139=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1139=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1139=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1139=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1139=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1139=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1139=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1139=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1139=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1139=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1139=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1139=1
## Package List:
* openSUSE Leap Micro 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* openSUSE Leap Micro 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* openSUSE Leap 15.5 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20240312-150200.38.1
* Basesystem Module 15-SP5 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Proxy 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Server 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Enterprise Storage 7.1 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20240312-150200.38.1
## References:
* https://www.suse.com/security/cve/CVE-2023-22655.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-38575.html
* https://www.suse.com/security/cve/CVE-2023-39368.html
* https://www.suse.com/security/cve/CVE-2023-43490.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221323
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1143-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1143=1 openSUSE-SLE-15.5-2024-1143=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1143=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150500.3.7.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* buildah-1.34.1-150500.3.7.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1144-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* Public Cloud Module 15-SP2
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.1
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Server 4.1
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1144=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1144=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1144=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1144=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1144=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1144=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1144=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1144=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1144=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1144=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150400.3.27.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1145-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1145=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1145=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1145=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1145=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1145=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* buildah-1.34.1-150300.8.22.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for podman
Announcement ID: SUSE-SU-2024:1146-1
Rating: important
References:
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for podman fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1146=1 openSUSE-SLE-15.5-2024-1146=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1146=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1146=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* Containers Module 15-SP5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for curl
Announcement ID: SUSE-SU-2024:1151-1
Rating: moderate
References:
* bsc#1221665
* bsc#1221667
Cross-References:
* CVE-2024-2004
* CVE-2024-2398
CVSS scores:
* CVE-2024-2004 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-2398 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665)
* CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1151=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1151=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1151=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1151=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1151=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1151=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1151=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1151=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1151=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1151=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.4 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl-devel-64bit-8.0.1-150400.5.44.1
* libcurl4-64bit-8.0.1-150400.5.44.1
* libcurl4-64bit-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.5 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Proxy 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2004.html
* https://www.suse.com/security/cve/CVE-2024-2398.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221665
* https://bugzilla.suse.com/show_bug.cgi?id=1221667
1
0
08 Apr '24
# Security update for xen
Announcement ID: SUSE-SU-2024:1152-1
Rating: moderate
References:
* bsc#1221332
* bsc#1221334
Cross-References:
* CVE-2023-28746
* CVE-2024-2193
CVSS scores:
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-2193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-28746: Register File Data Sampling (bsc#1221332)
* CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1152=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1152=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1152=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1152=1
## Package List:
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-devel-4.14.6_12-150300.3.69.1
* xen-tools-domU-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* xen-tools-domU-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (x86_64)
* xen-libs-32bit-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-32bit-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* xen-tools-4.14.6_12-150300.3.69.1
* xen-4.14.6_12-150300.3.69.1
* xen-tools-debuginfo-4.14.6_12-150300.3.69.1
* xen-doc-html-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (noarch)
* xen-tools-xendomains-wait-disk-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* xen-libs-64bit-4.14.6_12-150300.3.69.1
* xen-libs-64bit-debuginfo-4.14.6_12-150300.3.69.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2024-2193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221332
* https://bugzilla.suse.com/show_bug.cgi?id=1221334
1
0