openSUSE Security Announce
Threads by month
- ----- 2024 -----
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
May 2022
- 1 participants
- 77 discussions
SUSE-SU-2022:1898-1: moderate: Security update for fribidi
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for fribidi
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1898-1
Rating: moderate
References: #1196147 #1196148 #1196150
Cross-References: CVE-2022-25308 CVE-2022-25309 CVE-2022-25310
CVSS scores:
CVE-2022-25308 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
CVE-2022-25309 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-25310 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for fribidi fixes the following issues:
- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode
(bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in
fribidi_remove_bidi_marks (bsc#1196150).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1898=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1898=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1898=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
fribidi-1.0.10-150400.3.3.1
fribidi-debuginfo-1.0.10-150400.3.3.1
fribidi-debugsource-1.0.10-150400.3.3.1
fribidi-devel-1.0.10-150400.3.3.1
libfribidi0-1.0.10-150400.3.3.1
libfribidi0-debuginfo-1.0.10-150400.3.3.1
- openSUSE Leap 15.4 (x86_64):
libfribidi0-32bit-1.0.10-150400.3.3.1
libfribidi0-32bit-debuginfo-1.0.10-150400.3.3.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (x86_64):
fribidi-debugsource-1.0.10-150400.3.3.1
libfribidi0-32bit-1.0.10-150400.3.3.1
libfribidi0-32bit-debuginfo-1.0.10-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
fribidi-1.0.10-150400.3.3.1
fribidi-debuginfo-1.0.10-150400.3.3.1
fribidi-debugsource-1.0.10-150400.3.3.1
fribidi-devel-1.0.10-150400.3.3.1
libfribidi0-1.0.10-150400.3.3.1
libfribidi0-debuginfo-1.0.10-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2022-25308.html
https://www.suse.com/security/cve/CVE-2022-25309.html
https://www.suse.com/security/cve/CVE-2022-25310.html
https://bugzilla.suse.com/1196147
https://bugzilla.suse.com/1196148
https://bugzilla.suse.com/1196150
1
0
SUSE-SU-2022:1895-1: important: Security update for postgresql13
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for postgresql13
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1895-1
Rating: important
References: #1199475
Cross-References: CVE-2022-1552
CVSS scores:
CVE-2022-1552 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Legacy Software 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for postgresql13 fixes the following issues:
- CVE-2022-1552: Confine additional operations within "security restricted
operation" sandboxes (bsc#1199475).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1895=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1895=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1895=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1895=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1895=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1895=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1895=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1895=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1895=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1895=1
- SUSE Linux Enterprise Module for Legacy Software 15-SP4:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2022-1895=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1895=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1895=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1895=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1895=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-llvmjit-13.7-150200.5.28.1
postgresql13-llvmjit-debuginfo-13.7-150200.5.28.1
postgresql13-llvmjit-devel-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
postgresql13-test-13.7-150200.5.28.1
- openSUSE Leap 15.4 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-llvmjit-13.7-150200.5.28.1
postgresql13-llvmjit-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
postgresql13-test-13.7-150200.5.28.1
- openSUSE Leap 15.3 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Manager Server 4.1 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Manager Proxy 4.1 (x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Manager Proxy 4.1 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql13-llvmjit-13.7-150200.5.28.1
postgresql13-llvmjit-debuginfo-13.7-150200.5.28.1
postgresql13-test-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP4 (aarch64 ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-llvmjit-13.7-150200.5.28.1
postgresql13-llvmjit-debuginfo-13.7-150200.5.28.1
postgresql13-llvmjit-devel-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP4 (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
postgresql13-docs-13.7-150200.5.28.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
postgresql13-13.7-150200.5.28.1
postgresql13-contrib-13.7-150200.5.28.1
postgresql13-contrib-debuginfo-13.7-150200.5.28.1
postgresql13-debuginfo-13.7-150200.5.28.1
postgresql13-debugsource-13.7-150200.5.28.1
postgresql13-devel-13.7-150200.5.28.1
postgresql13-devel-debuginfo-13.7-150200.5.28.1
postgresql13-plperl-13.7-150200.5.28.1
postgresql13-plperl-debuginfo-13.7-150200.5.28.1
postgresql13-plpython-13.7-150200.5.28.1
postgresql13-plpython-debuginfo-13.7-150200.5.28.1
postgresql13-pltcl-13.7-150200.5.28.1
postgresql13-pltcl-debuginfo-13.7-150200.5.28.1
postgresql13-server-13.7-150200.5.28.1
postgresql13-server-debuginfo-13.7-150200.5.28.1
postgresql13-server-devel-13.7-150200.5.28.1
postgresql13-server-devel-debuginfo-13.7-150200.5.28.1
- SUSE Enterprise Storage 7 (noarch):
postgresql13-docs-13.7-150200.5.28.1
References:
https://www.suse.com/security/cve/CVE-2022-1552.html
https://bugzilla.suse.com/1199475
1
0
SUSE-SU-2022:1892-1: moderate: Security update for dpdk
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for dpdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1892-1
Rating: moderate
References: #1195172 #1198873 #1198963 #1198964
Cross-References: CVE-2021-3839 CVE-2022-0669
CVSS scores:
CVE-2021-3839 (SUSE): 5.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L
CVE-2022-0669 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for dpdk fixes the following issues:
Security:
- CVE-2021-3839: Fixed a memory corruption issue during vhost-user
communication (bsc#1198963).
- CVE-2022-0669: Fixed a denial of service that could be triggered by a
vhost-user master (bsc#1198964).
Bugfixes:
- kni: allow configuring thread granularity (bsc#1195172).
- Fixed reading of PCI device name as UTF strings (bsc#1198873).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1892=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1892=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1892=1
Package List:
- openSUSE Leap 15.4 (aarch64 x86_64):
dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
- openSUSE Leap 15.4 (aarch64):
dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
dpdk-19.11.4-150300.11.1
dpdk-debuginfo-19.11.4-150300.11.1
dpdk-debugsource-19.11.4-150300.11.1
dpdk-devel-19.11.4-150300.11.1
dpdk-devel-debuginfo-19.11.4-150300.11.1
dpdk-examples-19.11.4-150300.11.1
dpdk-examples-debuginfo-19.11.4-150300.11.1
dpdk-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-tools-19.11.4-150300.11.1
dpdk-tools-debuginfo-19.11.4-150300.11.1
libdpdk-20_0-19.11.4-150300.11.1
libdpdk-20_0-debuginfo-19.11.4-150300.11.1
- openSUSE Leap 15.3 (aarch64 x86_64):
dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
- openSUSE Leap 15.3 (aarch64):
dpdk-thunderx-19.11.4-150300.11.1
dpdk-thunderx-debuginfo-19.11.4-150300.11.1
dpdk-thunderx-debugsource-19.11.4-150300.11.1
dpdk-thunderx-devel-19.11.4-150300.11.1
dpdk-thunderx-devel-debuginfo-19.11.4-150300.11.1
dpdk-thunderx-examples-19.11.4-150300.11.1
dpdk-thunderx-examples-debuginfo-19.11.4-150300.11.1
dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-tools-19.11.4-150300.11.1
dpdk-thunderx-tools-debuginfo-19.11.4-150300.11.1
- openSUSE Leap 15.3 (noarch):
dpdk-doc-19.11.4-150300.11.1
dpdk-thunderx-doc-19.11.4-150300.11.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le x86_64):
dpdk-19.11.4-150300.11.1
dpdk-debuginfo-19.11.4-150300.11.1
dpdk-debugsource-19.11.4-150300.11.1
dpdk-devel-19.11.4-150300.11.1
dpdk-devel-debuginfo-19.11.4-150300.11.1
dpdk-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-tools-19.11.4-150300.11.1
dpdk-tools-debuginfo-19.11.4-150300.11.1
libdpdk-20_0-19.11.4-150300.11.1
libdpdk-20_0-debuginfo-19.11.4-150300.11.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64):
dpdk-thunderx-19.11.4-150300.11.1
dpdk-thunderx-debuginfo-19.11.4-150300.11.1
dpdk-thunderx-debugsource-19.11.4-150300.11.1
dpdk-thunderx-devel-19.11.4-150300.11.1
dpdk-thunderx-devel-debuginfo-19.11.4-150300.11.1
dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.63-150300.11.1
dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.63-150300.11.1
References:
https://www.suse.com/security/cve/CVE-2021-3839.html
https://www.suse.com/security/cve/CVE-2022-0669.html
https://bugzilla.suse.com/1195172
https://bugzilla.suse.com/1198873
https://bugzilla.suse.com/1198963
https://bugzilla.suse.com/1198964
1
0
SUSE-SU-2022:1894-1: important: Security update for postgresql12
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for postgresql12
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1894-1
Rating: important
References: #1199475
Cross-References: CVE-2022-1552
CVSS scores:
CVE-2022-1552 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Legacy Software 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for postgresql12 fixes the following issues:
- CVE-2022-1552: Confine additional operations within "security restricted
operation" sandboxes (bsc#1199475).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1894=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1894=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1894=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1894=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1894=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1894=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1894=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1894=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1894=1
- SUSE Linux Enterprise Module for Legacy Software 15-SP3:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2022-1894=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1894=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1894=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1894=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-llvmjit-12.11-150200.8.32.1
postgresql12-llvmjit-debuginfo-12.11-150200.8.32.1
postgresql12-llvmjit-devel-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
postgresql12-test-12.11-150200.8.32.1
- openSUSE Leap 15.4 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-llvmjit-12.11-150200.8.32.1
postgresql12-llvmjit-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
postgresql12-test-12.11-150200.8.32.1
- openSUSE Leap 15.3 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Manager Server 4.1 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Manager Proxy 4.1 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Manager Proxy 4.1 (x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql12-llvmjit-12.11-150200.8.32.1
postgresql12-llvmjit-debuginfo-12.11-150200.8.32.1
postgresql12-test-12.11-150200.8.32.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP3 (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
postgresql12-docs-12.11-150200.8.32.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
postgresql12-12.11-150200.8.32.1
postgresql12-contrib-12.11-150200.8.32.1
postgresql12-contrib-debuginfo-12.11-150200.8.32.1
postgresql12-debuginfo-12.11-150200.8.32.1
postgresql12-debugsource-12.11-150200.8.32.1
postgresql12-devel-12.11-150200.8.32.1
postgresql12-devel-debuginfo-12.11-150200.8.32.1
postgresql12-plperl-12.11-150200.8.32.1
postgresql12-plperl-debuginfo-12.11-150200.8.32.1
postgresql12-plpython-12.11-150200.8.32.1
postgresql12-plpython-debuginfo-12.11-150200.8.32.1
postgresql12-pltcl-12.11-150200.8.32.1
postgresql12-pltcl-debuginfo-12.11-150200.8.32.1
postgresql12-server-12.11-150200.8.32.1
postgresql12-server-debuginfo-12.11-150200.8.32.1
postgresql12-server-devel-12.11-150200.8.32.1
postgresql12-server-devel-debuginfo-12.11-150200.8.32.1
- SUSE Enterprise Storage 7 (noarch):
postgresql12-docs-12.11-150200.8.32.1
References:
https://www.suse.com/security/cve/CVE-2022-1552.html
https://bugzilla.suse.com/1199475
1
0
openSUSE-SU-2022:10001-1: moderate: Security update for pcmanfm
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
openSUSE Security Update: Security update for pcmanfm
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10001-1
Rating: moderate
References: #1039140
Cross-References: CVE-2017-8934
CVSS scores:
CVE-2017-8934 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pcmanfm fixes the following issues:
update to 1.3.2:
* Fixed case when some keyboard shortcuts stopped working: Alt+Home, Alt+Up
* Fixed sytem reboot delayed for 90 seconds in some cases
new upstream release of pcmanfm 1.3.1
* fixed crash on reload while directory changes
* changed size of large thumbnails to 512
* added application/gzip to archivers.list
* added image/x-compressed-xcf to archivers.list
* allowed bigger sizes of icons and thumbnails
new upstream release of pcmanfm 1.3.0
* Fixed potential access violation, use runtime user dir instead
of tmp diri for single instance socket. boo#1039140 CVE-2017-8934
* Fixed an issue with losing icons on desktop, when file name has a
���[��� char.
* Added a missing tooltip for ���New Window��� toolbar button.
* Fixed an issue when single instance socket directory did not exist
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-10001=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 ppc64le s390x x86_64):
pcmanfm-1.3.2-bp153.2.3.1
pcmanfm-devel-1.3.2-bp153.2.3.1
- openSUSE Backports SLE-15-SP3 (noarch):
pcmanfm-lang-1.3.2-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2017-8934.html
https://bugzilla.suse.com/1039140
1
0
SUSE-SU-2022:1888-1: moderate: Security update for helm-mirror
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for helm-mirror
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1888-1
Rating: moderate
References: #1156646 #1197728
Cross-References: CVE-2019-18658
CVSS scores:
CVE-2019-18658 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2019-18658 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Containers 15-SP3
SUSE Linux Enterprise Module for Containers 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for helm-mirror fixes the following issues:
- Updated to version 0.3.1:
- CVE-2019-18658: Fixed a potential symbolic link issue in helm that
could be used to leak sensitive files (bsc#1156646).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1888=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1888=1
- SUSE Linux Enterprise Module for Containers 15-SP4:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-1888=1
- SUSE Linux Enterprise Module for Containers 15-SP3:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-1888=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
helm-mirror-0.3.1-150000.1.13.1
helm-mirror-debuginfo-0.3.1-150000.1.13.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
helm-mirror-0.3.1-150000.1.13.1
helm-mirror-debuginfo-0.3.1-150000.1.13.1
- SUSE Linux Enterprise Module for Containers 15-SP4 (aarch64 ppc64le s390x x86_64):
helm-mirror-0.3.1-150000.1.13.1
helm-mirror-debuginfo-0.3.1-150000.1.13.1
- SUSE Linux Enterprise Module for Containers 15-SP3 (aarch64 ppc64le s390x x86_64):
helm-mirror-0.3.1-150000.1.13.1
helm-mirror-debuginfo-0.3.1-150000.1.13.1
References:
https://www.suse.com/security/cve/CVE-2019-18658.html
https://bugzilla.suse.com/1156646
https://bugzilla.suse.com/1197728
1
0
SUSE-SU-2022:1890-1: important: Security update for postgresql10
by opensuse-security@opensuse.org 31 May '22
by opensuse-security@opensuse.org 31 May '22
31 May '22
SUSE Security Update: Security update for postgresql10
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1890-1
Rating: important
References: #1199475
Cross-References: CVE-2022-1552
CVSS scores:
CVE-2022-1552 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise Module for Legacy Software 15-SP3
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for postgresql10 fixes the following issues:
- CVE-2022-1552: Confine additional operations within "security restricted
operation" sandboxes (bsc#1199475).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1890=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1890=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1890=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1890=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1890=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1890=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1890=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1890=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1890=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1890=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1890=1
- SUSE Linux Enterprise Module for Legacy Software 15-SP3:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2022-1890=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1890=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1890=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1890=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1890=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1890=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1890=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-llvmjit-devel-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
postgresql10-test-10.21-150100.8.47.1
- openSUSE Leap 15.4 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
postgresql10-test-10.21-150100.8.47.1
- openSUSE Leap 15.3 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Manager Server 4.1 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Manager Proxy 4.1 (x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Manager Proxy 4.1 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Enterprise Storage 7 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
- SUSE Enterprise Storage 6 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE CaaS Platform 4.0 (noarch):
postgresql10-docs-10.21-150100.8.47.1
- SUSE CaaS Platform 4.0 (x86_64):
postgresql10-10.21-150100.8.47.1
postgresql10-contrib-10.21-150100.8.47.1
postgresql10-contrib-debuginfo-10.21-150100.8.47.1
postgresql10-debuginfo-10.21-150100.8.47.1
postgresql10-debugsource-10.21-150100.8.47.1
postgresql10-devel-10.21-150100.8.47.1
postgresql10-devel-debuginfo-10.21-150100.8.47.1
postgresql10-plperl-10.21-150100.8.47.1
postgresql10-plperl-debuginfo-10.21-150100.8.47.1
postgresql10-plpython-10.21-150100.8.47.1
postgresql10-plpython-debuginfo-10.21-150100.8.47.1
postgresql10-pltcl-10.21-150100.8.47.1
postgresql10-pltcl-debuginfo-10.21-150100.8.47.1
postgresql10-server-10.21-150100.8.47.1
postgresql10-server-debuginfo-10.21-150100.8.47.1
References:
https://www.suse.com/security/cve/CVE-2022-1552.html
https://bugzilla.suse.com/1199475
1
0
SUSE-SU-2022:1883-1: important: Security update for pcre2
by opensuse-security@opensuse.org 30 May '22
by opensuse-security@opensuse.org 30 May '22
30 May '22
SUSE Security Update: Security update for pcre2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1883-1
Rating: important
References: #1199232
Cross-References: CVE-2022-1586
CVSS scores:
CVE-2022-1586 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-1586 (SUSE): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pcre2 fixes the following issues:
- CVE-2022-1586: Fixed out-of-bounds read via missing Unicode property
matching issue in JIT compiled regular expressions (bsc#1199232).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1883=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1883=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1883=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1883=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1883=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1883=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1883=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1883=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1883=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1883=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1883=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1883=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1883=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1883=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1883=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1883=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1883=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1883=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
pcre2-devel-static-10.31-150000.3.7.1
pcre2-tools-10.31-150000.3.7.1
pcre2-tools-debuginfo-10.31-150000.3.7.1
- openSUSE Leap 15.3 (x86_64):
libpcre2-16-0-32bit-10.31-150000.3.7.1
libpcre2-16-0-32bit-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-32bit-10.31-150000.3.7.1
libpcre2-32-0-32bit-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-32bit-10.31-150000.3.7.1
libpcre2-8-0-32bit-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-32bit-10.31-150000.3.7.1
libpcre2-posix2-32bit-debuginfo-10.31-150000.3.7.1
- openSUSE Leap 15.3 (noarch):
pcre2-doc-10.31-150000.3.7.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Manager Proxy 4.1 (x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
- SUSE CaaS Platform 4.0 (x86_64):
libpcre2-16-0-10.31-150000.3.7.1
libpcre2-16-0-debuginfo-10.31-150000.3.7.1
libpcre2-32-0-10.31-150000.3.7.1
libpcre2-32-0-debuginfo-10.31-150000.3.7.1
libpcre2-8-0-10.31-150000.3.7.1
libpcre2-8-0-debuginfo-10.31-150000.3.7.1
libpcre2-posix2-10.31-150000.3.7.1
libpcre2-posix2-debuginfo-10.31-150000.3.7.1
pcre2-debugsource-10.31-150000.3.7.1
pcre2-devel-10.31-150000.3.7.1
References:
https://www.suse.com/security/cve/CVE-2022-1586.html
https://bugzilla.suse.com/1199232
1
0
SUSE-SU-2022:1882-1: important: Security update for tiff
by opensuse-security@opensuse.org 30 May '22
by opensuse-security@opensuse.org 30 May '22
30 May '22
SUSE Security Update: Security update for tiff
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1882-1
Rating: important
References: #1195964 #1195965 #1197066 #1197068 #1197072
#1197073 #1197074 #1197631
Cross-References: CVE-2022-0561 CVE-2022-0562 CVE-2022-0865
CVE-2022-0891 CVE-2022-0908 CVE-2022-0909
CVE-2022-0924 CVE-2022-1056
CVSS scores:
CVE-2022-0561 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0561 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0562 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0562 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0865 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0865 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0891 (NVD) : 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
CVE-2022-0891 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0908 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0908 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0909 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0909 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0924 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0924 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-1056 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-1056 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for tiff fixes the following issues:
- CVE-2022-0561: Fixed null source pointer passed as an argument to
memcpy() within TIFFFetchStripThing() in tif_dirread.c (bsc#1195964).
- CVE-2022-0562: Fixed null source pointer passed as an argument to
memcpy() within TIFFReadDirectory() in tif_dirread.c (bsc#1195965).
- CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc
(bsc#1197066).
- CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have
led to a denial-of-service via a crafted tiff file (bsc#1197072).
- CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have
led to a denial-of-service via a crafted tiff file (bsc#1197073).
- CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy
in TIFFFetchNormalTag() (bsc#1197074).
- CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could
have led to a denial-of-service via a crafted tiff file (bsc#1197631).
- CVE-2022-0891: Fixed heap buffer overflow in extractImageSection
(bsc#1197068).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1882=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1882=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1882=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1882=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1882=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1882=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1882=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1882=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1882=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1882=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1882=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1882=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1882=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1882=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1882=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1882=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1882=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1882=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1882=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1882=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1882=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1882=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- openSUSE Leap 15.4 (x86_64):
libtiff-devel-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- openSUSE Leap 15.3 (x86_64):
libtiff-devel-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Manager Server 4.1 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Manager Proxy 4.1 (x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server for SAP 15 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (aarch64 ppc64le s390x x86_64):
tiff-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
tiff-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Enterprise Storage 7 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
- SUSE Enterprise Storage 6 (x86_64):
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
- SUSE CaaS Platform 4.0 (x86_64):
libtiff-devel-4.0.9-150000.45.8.1
libtiff5-32bit-4.0.9-150000.45.8.1
libtiff5-32bit-debuginfo-4.0.9-150000.45.8.1
libtiff5-4.0.9-150000.45.8.1
libtiff5-debuginfo-4.0.9-150000.45.8.1
tiff-debuginfo-4.0.9-150000.45.8.1
tiff-debugsource-4.0.9-150000.45.8.1
References:
https://www.suse.com/security/cve/CVE-2022-0561.html
https://www.suse.com/security/cve/CVE-2022-0562.html
https://www.suse.com/security/cve/CVE-2022-0865.html
https://www.suse.com/security/cve/CVE-2022-0891.html
https://www.suse.com/security/cve/CVE-2022-0908.html
https://www.suse.com/security/cve/CVE-2022-0909.html
https://www.suse.com/security/cve/CVE-2022-0924.html
https://www.suse.com/security/cve/CVE-2022-1056.html
https://bugzilla.suse.com/1195964
https://bugzilla.suse.com/1195965
https://bugzilla.suse.com/1197066
https://bugzilla.suse.com/1197068
https://bugzilla.suse.com/1197072
https://bugzilla.suse.com/1197073
https://bugzilla.suse.com/1197074
https://bugzilla.suse.com/1197631
1
0
openSUSE-SU-2022:0156-1: important: Security update for opera
by opensuse-security@opensuse.org 28 May '22
by opensuse-security@opensuse.org 28 May '22
28 May '22
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0156-1
Rating: important
References:
Cross-References: CVE-2022-1364 CVE-2022-1633 CVE-2022-1634
CVE-2022-1635 CVE-2022-1636 CVE-2022-1637
CVE-2022-1638 CVE-2022-1639 CVE-2022-1640
CVE-2022-1641
Affected Products:
openSUSE Leap 15.4:NonFree
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
Update to 87.0.4390.25:
- CHR-8870 Update chromium on desktop-stable-101-4390 to 101.0.4951.64
- DNA-99209 Enable #easy-files-multiupload on all streams
- DNA-99325 Use a preference to set number of recent searches and
recently closed in unfiltered dropdown
- DNA-99353 Translations for O87
- DNA-99365 Adding title to the first category duplicates categories
titles in the dropdown
- DNA-99385 Feedback button in filtered dropdown can overlap with
other web buttons for highlighted suggestion
- DNA-99391 Add bookmarks at the bottom of a bookmarks bar folder
- DNA-99491 Suggestion is not immediately removed form recent searches
view in dropdown.
- DNA-99501 Promote O87 to stable
- DNA-99504 ���Switch to tab��� button is not aligned to the right for
some categories in dropdown
- The update to chromium 101.0.4951.64 fixes following issues:
CVE-2022-1633, CVE-2022-1634, CVE-2022-1635, CVE-2022-1636,
CVE-2022-1637, CVE-2022-1638, CVE-2022-1639, CVE-2022-1640, CVE-2022-1641
- Complete Opera 87.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-87/
- Update to 86.0.4363.59
- DNA-99021 Crash in sidebar when extension of sidebar item was
uninstalled
- DNA-99359 Crash at opera::
ContinueShoppingExpiredProductRemoverImpl::RemoveExpiredProducts()
- Update to 86.0.4363.50
- DNA-68493 Opera doesn���t close address field drop-down when dragging
text from the address field
- DNA-99003 Crash at views::Widget::GetNativeView() const
- DNA-99133 BrowserSidebarWithProxyAuthTest.PreloadWithWebModalDialog
fails
- DNA-99230 Switching search engine with shortcut stopped working after
DNA-99178
- DNA-99317 Make history match appear on top
- Update to 86.0.4363.32
- DNA-98510 Blank icon in sidebar setup
- DNA-98525 Unable to drag tab to far right
- DNA-98893 Sound indicator is too precise in Google Meet
- DNA-98919 Shopping corner internal API access update
- DNA-98924 Tab tooltip gets stuck on screen
- DNA-98981 Enable easy-files-multiupload on developer stream
- DNA-99041 Move Shopping Corner to sidebar entry
- DNA-99061 Enable #address-bar-dropdown-categories on all streams
- DNA-99062 Create flag to show top sites and recently closed in
unfiltered suggestions
- DNA-99064 Hard to drag & drop current URL to a specific folder
on bookmarks bar when unfiltered dropdown is displayed
- DNA-99070 Make scroll button in Continue On scroll multiple items
- DNA-99089 Shopping corner tab is not preserved after restart
- DNA-99115 Request updating the Avro schema for sidebar event
- DNA-99117 Make sure shopping corner is enabled by default
- DNA-99178 Left/right not working in address bar dropdown
- DNA-99204 Hide Shopping Corner by default
- Update to 86.0.4363.23
- CHR-8843 Update chromium on desktop-stable-100-4363 to 100.0.4896.127
- DNA-98236 Turn on #snap-text-selection on all streams
- DNA-98507 DCHECK at address_bar_controller.cc(547)
- DNA-98528 Suggestions for internal pages disappear when typing their
full name
- DNA-98538 Change name of "Opera Crypto Wallet" to "Crypto Wallet"
- DNA-98540 Booking.com used instead of custom search engine
- DNA-98587 Favicon of booking suggestion in the city category is
unexpectedly changing
- DNA-98605 City suggestions should show URL in address field when
selected
- DNA-98608 #address-bar-dropdown-categories expired
- DNA-98616 Add recent searches to 'old' BABE
- DNA-98668 Switch to tab button leads to wrong tab
- DNA-98673 Improve suggestion removal handling in suggestion providers
- DNA-98681 Remove unused suggestion consumers
- DNA-98684 Have a dedicated SuggestionList for the new address bar
dropdown
- DNA-98685 Enable #native-crypto-wallet on developer
- DNA-98688 "Disable this feature" mini-menu settings is non-intuitive
- DNA-98690 Autocompleted text stayed in address field after removing
suggestion
- DNA-98738 Inline autocomplete suggestion for SD disappears after
typing 3rd letter of SD name
- DNA-98743 Blank dropdown after pressing space key
- DNA-98783 Improve showing suggestions with long URLs or page titles
- DNA-98785 "Switch to tab" button not shown for suggestions with www
subdomain when typing domain text
- DNA-98879 "Disable suggestions before typing" mini-menu option should
change to "Enable suggestions before typing" when being selected
- DNA-98917 Translations for O86
- DNA-98975 Turn on #snap-crop-tool on all channels
- DNA-98980 Enable #native-crypto-wallet on all streams
- DNA-99005 The sidebar item is not visible for already active crypto
wallet users when #native-crypto-wallet flag is enabled.
- DNA-99007 Crash at TemplateURLRef::ParseIfNecessary(SearchTermsData
const&) const
- DNA-99047 Promote O86 to stable
- The update to chromium 100.0.4896.127 fixes following issues:
CVE-2022-1364
- Complete Opera 86.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-86/
- Update to 85.0.4341.60
- DNA-98666 Set baidu as default search engine in China
- DNA-98707 Hint is not displayed for new crypto wallet sidebar icon
- DNA-98775 RichHintsSearchEngineCondition.testSogouSearchEngine errors
- Update to 85.0.4341.47
- DNA-98249 Add feature flag #native-crypto-wallet
- DNA-98250 Install extension on startup
- DNA-98251 Make Crypto Wallet setting enable / disable extension
- DNA-98252 Deactivate old desktop crypto wallet
- DNA-98253 Always show ���Crypto Wallet��� in Sidebar Setup
- DNA-98497 Crash when installing extension
- DNA-98506 Enable opera_feature_crypto_wallet_encryption
on desktop
- DNA-98510 Blank icon in sidebar setup
- DNA-98538 Change name of "Opera Crypto Wallet" to "Crypto Wallet"
- DNA-98685 Enable #native-crypto-wallet on developer
- DNA-98766 Crash at
opera::AddressBarControllerImpl::OpenNativeDropdown()
- DNA-98768 Crash at
extensions::ContentFilterPrivateIsWhitelistedFunction::Run()
- DNA-98770 Recent searches stay in address field after selecting entry
from dropdown
- DNA-98772 Screen sharing broken
- DNA-98803 Autofilled part appended after selecting address bar using
shortcut
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:NonFree:
zypper in -t patch openSUSE-2022-156=1
Package List:
- openSUSE Leap 15.4:NonFree (x86_64):
opera-87.0.4390.25-lp154.2.8.1
References:
https://www.suse.com/security/cve/CVE-2022-1364.html
https://www.suse.com/security/cve/CVE-2022-1633.html
https://www.suse.com/security/cve/CVE-2022-1634.html
https://www.suse.com/security/cve/CVE-2022-1635.html
https://www.suse.com/security/cve/CVE-2022-1636.html
https://www.suse.com/security/cve/CVE-2022-1637.html
https://www.suse.com/security/cve/CVE-2022-1638.html
https://www.suse.com/security/cve/CVE-2022-1639.html
https://www.suse.com/security/cve/CVE-2022-1640.html
https://www.suse.com/security/cve/CVE-2022-1641.html
1
0
SUSE-SU-2022:1870-1: important: Security update for curl
by opensuse-security@opensuse.org 27 May '22
by opensuse-security@opensuse.org 27 May '22
27 May '22
SUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1870-1
Rating: important
References: #1199223 #1199224
Cross-References: CVE-2022-27781 CVE-2022-27782
CVSS scores:
CVE-2022-27781 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-27782 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for curl fixes the following issues:
- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse
(bsc#1199224)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1870=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1870=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1870=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1870=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1870=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1870=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1870=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1870=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1870=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1870=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1870=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1870=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1870=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- openSUSE Leap 15.3 (x86_64):
libcurl-devel-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Manager Server 4.1 (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Manager Proxy 4.1 (x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
curl-7.66.0-150200.4.33.1
curl-debuginfo-7.66.0-150200.4.33.1
curl-debugsource-7.66.0-150200.4.33.1
libcurl-devel-7.66.0-150200.4.33.1
libcurl4-7.66.0-150200.4.33.1
libcurl4-debuginfo-7.66.0-150200.4.33.1
- SUSE Enterprise Storage 7 (x86_64):
libcurl4-32bit-7.66.0-150200.4.33.1
libcurl4-32bit-debuginfo-7.66.0-150200.4.33.1
References:
https://www.suse.com/security/cve/CVE-2022-27781.html
https://www.suse.com/security/cve/CVE-2022-27782.html
https://bugzilla.suse.com/1199223
https://bugzilla.suse.com/1199224
1
0
openSUSE-SU-2022:0151-1: moderate: Security update for bind
by opensuse-security@opensuse.org 27 May '22
by opensuse-security@opensuse.org 27 May '22
27 May '22
SUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0151-1
Rating: moderate
References: #1192146 #1199370
Cross-References: CVE-2021-25219 CVE-2022-27114
CVSS scores:
CVE-2021-25219 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-25219 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-27114 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-27114 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for bind fixes the following issues:
- CVE-2021-25219: Fixed flaw that allowed abusing lame cache to severely
degrade resolver performance (bsc#1192146).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-151=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-151=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
bind-9.16.6-150300.22.13.1
bind-chrootenv-9.16.6-150300.22.13.1
bind-debuginfo-9.16.6-150300.22.13.1
bind-debugsource-9.16.6-150300.22.13.1
bind-devel-9.16.6-150300.22.13.1
bind-utils-9.16.6-150300.22.13.1
bind-utils-debuginfo-9.16.6-150300.22.13.1
libbind9-1600-9.16.6-150300.22.13.1
libbind9-1600-debuginfo-9.16.6-150300.22.13.1
libdns1605-9.16.6-150300.22.13.1
libdns1605-debuginfo-9.16.6-150300.22.13.1
libirs-devel-9.16.6-150300.22.13.1
libirs1601-9.16.6-150300.22.13.1
libirs1601-debuginfo-9.16.6-150300.22.13.1
libisc1606-9.16.6-150300.22.13.1
libisc1606-debuginfo-9.16.6-150300.22.13.1
libisccc1600-9.16.6-150300.22.13.1
libisccc1600-debuginfo-9.16.6-150300.22.13.1
libisccfg1600-9.16.6-150300.22.13.1
libisccfg1600-debuginfo-9.16.6-150300.22.13.1
libns1604-9.16.6-150300.22.13.1
libns1604-debuginfo-9.16.6-150300.22.13.1
- openSUSE Leap 15.3 (noarch):
bind-doc-9.16.6-150300.22.13.1
python3-bind-9.16.6-150300.22.13.1
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
htmldoc-1.9.12-bp153.2.15.1
References:
https://www.suse.com/security/cve/CVE-2021-25219.html
https://www.suse.com/security/cve/CVE-2022-27114.html
https://bugzilla.suse.com/1192146
https://bugzilla.suse.com/1199370
1
0
openSUSE-SU-2022:0148-1: important: Security update for varnish
by opensuse-security@opensuse.org 27 May '22
by opensuse-security@opensuse.org 27 May '22
27 May '22
openSUSE Security Update: Security update for varnish
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0148-1
Rating: important
References: #1181400 #1188470 #1195188
Cross-References: CVE-2021-36740 CVE-2022-23959
CVSS scores:
CVE-2021-36740 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2021-36740 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23959 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2022-23959 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for varnish fixes the following issues:
varnish was updated to release 7.1.0 [boo#1195188] [CVE-2022-23959]
* VCL: It is now possible to assign a BLOB value to a BODY variable, in
addition to STRING as before.
* VMOD: New STRING strftime(TIME time, STRING format) function for UTC
formatting.
Update to release 6.6.1
* CVE-2021-36740: Fix an HTTP/2.0 request smuggling vulnerability.
[boo#1188470]
Update to release 6.6.0:
* The ban_cutoff parameter now refers to the overall length of the ban
list, including completed bans, where before only non-completed
(���active���) bans were counted towards ban_cutoff.
* Body bytes accounting has been fixed to always represent the number of
body bytes moved on the wire, exclusive of protocol-specific overhead
like HTTP/1 chunked encoding or HTTP/2 framing.
* The connection close reason has been fixed to properly report
SC_RESP_CLOSE where previously only SC_REQ_CLOSE was reported.
* Unless the new validate_headers feature is disabled, all newly set
headers are now validated to contain only characters allowed by RFC7230.
* The filter_re, keep_re and get_re functions from the bundled cookie vmod
have been changed to take the VCL_REGEX type. This implies that their
regular expression arguments now need to be literal, not e.g. string.
* The interface for private pointers in VMODs has been changed, the VRT
backend interface has been changed, many filter (VDP/VFP) related
signatures have been changed, and the stevedore API has been changed.
(Details thereto, see online changelog.)
Update to release 6.5.1
* Bump the VRT_MAJOR_VERSION number defined in the vrt.h
Update to release 6.5.0
* `PRIV_TOP` is now thread-safe to support parallel ESI implementations.
* varnishstat's JSON output format (-j option) has been changed.
* Behavior for 304-type responses was changed not to update the
Content-Encoding response header of the stored object.
- Update Git-Web repository link
Update to release 6.4.0
* The MAIN.sess_drop counter is gone.
* backend "none" was added for "no backend".
* The hash algorithm of the hash director was changed, so backend
selection will change once only when upgrading.
* It is now possible for VMOD authors to customize the connection pooling
of a dynamic backend.
* For more, see changes.rst.
Update to release 6.3.2
* Fix a denial of service vulnerability when using the proxy protocol
version 2.
Update to release 6.3.0
* The Host: header is folded to lower-case in the builtin_vcl.
* Improved performance of shared memory statistics counters.
* Synthetic objects created from vcl_backend_error {} now replace existing
stale objects as ordinary backend fetches would (for details see
changes.rst)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-148=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
libvarnishapi3-7.1.0-bp153.2.3.1
varnish-7.1.0-bp153.2.3.1
varnish-devel-7.1.0-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2021-36740.html
https://www.suse.com/security/cve/CVE-2022-23959.html
https://bugzilla.suse.com/1181400
https://bugzilla.suse.com/1188470
https://bugzilla.suse.com/1195188
1
0
openSUSE-SU-2022:0149-1: moderate: Security update for libredwg
by opensuse-security@opensuse.org 27 May '22
by opensuse-security@opensuse.org 27 May '22
27 May '22
SUSE Security Update: Security update for libredwg
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0149-1
Rating: moderate
References: #1193372 #1194767
Cross-References: CVE-2021-28237 CVE-2022-21658
CVSS scores:
CVE-2022-21658 (NVD) : 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
CVE-2022-21658 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
openSUSE Backports SLE-15-SP3
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for libredwg fixes the following issues:
Update to release 0.12.5 [boo#1193372] [CVE-2021-28237]
* Restricted accepted DXF objects to all stable and unstable classes,
minus MATERIAL, ARC_DIMENSION, SUN, PROXY*. I.e. most unstable objects
do not allow unknown DXF codes anymore. This fixed most oss-fuzz errors.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-149=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-149=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
cargo1.56-1.56.1-150300.7.6.1
cargo1.56-debuginfo-1.56.1-150300.7.6.1
rust1.56-1.56.1-150300.7.6.1
rust1.56-debuginfo-1.56.1-150300.7.6.1
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
libredwg-devel-0.12.5-bp153.2.3.1
libredwg-tools-0.12.5-bp153.2.3.1
libredwg0-0.12.5-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2021-28237.html
https://www.suse.com/security/cve/CVE-2022-21658.html
https://bugzilla.suse.com/1193372
https://bugzilla.suse.com/1194767
1
0
openSUSE-SU-2022:0150-1: important: Security update for seamonkey
by opensuse-security@opensuse.org 27 May '22
by opensuse-security@opensuse.org 27 May '22
27 May '22
openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0150-1
Rating: important
References: #1194735
Cross-References: CVE-2021-45417
CVSS scores:
CVE-2021-45417 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for seamonkey fixes the following issues:
Update to SeaMonkey 2.53.12
* Format Toolbar forgets its hidden status when switching to other view
modes bug 1719020.
* Remove obsolete plugin code from SeaMonkey bug 1762733.
* Fix a few strict warnings in SeaMonkey bug 1755553.
* Remove Run Flash from Site permissions and page info bug 1758289.
* Use fixIterator and replace use of removeItemAt in FilterListDialog bug
1756359.
* Remove RDF usage in tabmail.js bug 1758282.
* Implement 'Edit Template' and 'New Message From Template' commands and
UI bug 1759376.
* [SM] Implement 'Edit Draft' command and hide it when not in a draft
folder (port Thunderbird bug 1106412) bug 1256716.
* Messages in Template folder need "Edit Template" button in header (like
for Drafts) bug 80280.
* Refactor and simplify the feed Subscribe dialog options updates bug
1420473.
* Add system memory and disk size and placeDB page limit to about:support
bug 1753729.
* Remove warning about missing plugins in SeaMonkey 2.53 and 2.57 bug
1755558.
* SeaMonkey 2.53.12 uses the same backend as Firefox and contains the
relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.12 shares most parts of the mail and news code with
Thunderbird. Please read the Thunderbird 60.8.0 release notes for
specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.9 and
Thunderbird 91.9 ESR plus many enhancements have been backported. We
will continue to enhance SeaMonkey security in subsequent 2.53.x beta
and release versions as fast as we are able to.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2022-150=1 openSUSE-SLE-15.3-2022-150=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
aide-0.16-24.1
aide-debuginfo-0.16-24.1
aide-debugsource-0.16-24.1
aide-test-0.16-24.1
- openSUSE Leap 15.3 (i586 s390x x86_64):
seamonkey-2.53.12-lp153.17.8.2
seamonkey-debuginfo-2.53.12-lp153.17.8.2
seamonkey-debugsource-2.53.12-lp153.17.8.2
seamonkey-dom-inspector-2.53.12-lp153.17.8.2
seamonkey-irc-2.53.12-lp153.17.8.2
References:
https://www.suse.com/security/cve/CVE-2021-45417.html
https://bugzilla.suse.com/1194735
1
0
openSUSE-SU-2022:0147-1: important: Security update for opera
by opensuse-security@opensuse.org 26 May '22
by opensuse-security@opensuse.org 26 May '22
26 May '22
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0147-1
Rating: important
References:
Cross-References: CVE-2022-1633 CVE-2022-1634 CVE-2022-1635
CVE-2022-1636 CVE-2022-1637 CVE-2022-1638
CVE-2022-1639 CVE-2022-1640 CVE-2022-1641
Affected Products:
openSUSE Leap 15.3:NonFree
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
Update to 87.0.4390.25:
- CHR-8870 Update chromium on desktop-stable-101-4390 to 101.0.4951.64
- DNA-99209 Enable #easy-files-multiupload on all streams
- DNA-99325 Use a preference to set number of recent searches and
recently closed in unfiltered dropdown
- DNA-99353 Translations for O87
- DNA-99365 Adding title to the first category duplicates categories
titles in the dropdown
- DNA-99385 Feedback button in filtered dropdown can overlap with
other web buttons for highlighted suggestion
- DNA-99391 Add bookmarks at the bottom of a bookmarks bar folder
- DNA-99491 Suggestion is not immediately removed form recent searches
view in dropdown.
- DNA-99501 Promote O87 to stable
- DNA-99504 ���Switch to tab��� button is not aligned to the right for
some categories in dropdown
- The update to chromium 101.0.4951.64 fixes following issues:
CVE-2022-1633, CVE-2022-1634, CVE-2022-1635, CVE-2022-1636,
CVE-2022-1637, CVE-2022-1638, CVE-2022-1639, CVE-2022-1640, CVE-2022-1641
- Complete Opera 87.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-87/
- Update to 86.0.4363.59
- DNA-99021 Crash in sidebar when extension of sidebar item was
uninstalled
- DNA-99359 Crash at opera::
ContinueShoppingExpiredProductRemoverImpl::RemoveExpiredProducts()
- Update to 86.0.4363.50
- DNA-68493 Opera doesn���t close address field drop-down when dragging
text from the address field
- DNA-99003 Crash at views::Widget::GetNativeView() const
- DNA-99133 BrowserSidebarWithProxyAuthTest.PreloadWithWebModalDialog
fails
- DNA-99230 Switching search engine with shortcut stopped working after
DNA-99178
- DNA-99317 Make history match appear on top
- Update to 86.0.4363.32
- DNA-98510 Blank icon in sidebar setup
- DNA-98525 Unable to drag tab to far right
- DNA-98893 Sound indicator is too precise in Google Meet
- DNA-98919 Shopping corner internal API access update
- DNA-98924 Tab tooltip gets stuck on screen
- DNA-98981 Enable easy-files-multiupload on developer stream
- DNA-99041 Move Shopping Corner to sidebar entry
- DNA-99061 Enable #address-bar-dropdown-categories on all streams
- DNA-99062 Create flag to show top sites and recently closed in
unfiltered suggestions
- DNA-99064 Hard to drag & drop current URL to a specific folder
on bookmarks bar when unfiltered dropdown is displayed
- DNA-99070 Make scroll button in Continue On scroll multiple items
- DNA-99089 Shopping corner tab is not preserved after restart
- DNA-99115 Request updating the Avro schema for sidebar event
- DNA-99117 Make sure shopping corner is enabled by default
- DNA-99178 Left/right not working in address bar dropdown
- DNA-99204 Hide Shopping Corner by default
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:NonFree:
zypper in -t patch openSUSE-2022-147=1
Package List:
- openSUSE Leap 15.3:NonFree (x86_64):
opera-87.0.4390.25-lp153.2.48.1
References:
https://www.suse.com/security/cve/CVE-2022-1633.html
https://www.suse.com/security/cve/CVE-2022-1634.html
https://www.suse.com/security/cve/CVE-2022-1635.html
https://www.suse.com/security/cve/CVE-2022-1636.html
https://www.suse.com/security/cve/CVE-2022-1637.html
https://www.suse.com/security/cve/CVE-2022-1638.html
https://www.suse.com/security/cve/CVE-2022-1639.html
https://www.suse.com/security/cve/CVE-2022-1640.html
https://www.suse.com/security/cve/CVE-2022-1641.html
1
0
SUSE-SU-2022:1862-1: moderate: Security update for go1.17
by opensuse-security@opensuse.org 26 May '22
by opensuse-security@opensuse.org 26 May '22
26 May '22
SUSE Security Update: Security update for go1.17
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1862-1
Rating: moderate
References: #1190649 #1199413
Cross-References: CVE-2022-29526
CVSS scores:
CVE-2022-29526 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for go1.17 fixes the following issues:
- CVE-2022-29526: Fixed faccessat() system call operation that checked the
wrong group (bsc#1199413).
- go1.17.10 (released 2022-05-10) (bsc#1190649).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1862=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1862=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1862=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1862=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.10-150000.1.34.1
go1.17-doc-1.17.10-150000.1.34.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.17-race-1.17.10-150000.1.34.1
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
go1.17-1.17.10-150000.1.34.1
go1.17-doc-1.17.10-150000.1.34.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.17-race-1.17.10-150000.1.34.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.10-150000.1.34.1
go1.17-doc-1.17.10-150000.1.34.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.17-race-1.17.10-150000.1.34.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.10-150000.1.34.1
go1.17-doc-1.17.10-150000.1.34.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.17-race-1.17.10-150000.1.34.1
References:
https://www.suse.com/security/cve/CVE-2022-29526.html
https://bugzilla.suse.com/1190649
https://bugzilla.suse.com/1199413
1
0
SUSE-SU-2022:1861-1: important: Security update for cups
by opensuse-security@opensuse.org 26 May '22
by opensuse-security@opensuse.org 26 May '22
26 May '22
SUSE Security Update: Security update for cups
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1861-1
Rating: important
References: #1199474
Cross-References: CVE-2022-26691
CVSS scores:
CVE-2022-26691 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for cups fixes the following issues:
- CVE-2022-26691: Fixed an authentication bypass and code execution
vulnerability (bsc#1199474)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1861=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1861=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1861=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1861=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1861=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1861=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1861=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1861=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1861=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1861=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1861=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1861=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1861=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1861=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1861=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1861=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1861=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1861=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1861=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1861=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1861=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- openSUSE Leap 15.4 (x86_64):
cups-devel-32bit-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-32bit-2.2.7-150000.3.32.1
libcupscgi1-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-32bit-2.2.7-150000.3.32.1
libcupsimage2-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-32bit-2.2.7-150000.3.32.1
libcupsmime1-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-32bit-2.2.7-150000.3.32.1
libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.32.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- openSUSE Leap 15.3 (x86_64):
cups-devel-32bit-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-32bit-2.2.7-150000.3.32.1
libcupscgi1-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-32bit-2.2.7-150000.3.32.1
libcupsimage2-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-32bit-2.2.7-150000.3.32.1
libcupsmime1-32bit-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-32bit-2.2.7-150000.3.32.1
libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Manager Server 4.1 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Manager Proxy 4.1 (x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server for SAP 15 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
cups-config-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Enterprise Storage 7 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
- SUSE Enterprise Storage 6 (x86_64):
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
- SUSE CaaS Platform 4.0 (x86_64):
cups-2.2.7-150000.3.32.1
cups-client-2.2.7-150000.3.32.1
cups-client-debuginfo-2.2.7-150000.3.32.1
cups-config-2.2.7-150000.3.32.1
cups-ddk-2.2.7-150000.3.32.1
cups-ddk-debuginfo-2.2.7-150000.3.32.1
cups-debuginfo-2.2.7-150000.3.32.1
cups-debugsource-2.2.7-150000.3.32.1
cups-devel-2.2.7-150000.3.32.1
libcups2-2.2.7-150000.3.32.1
libcups2-32bit-2.2.7-150000.3.32.1
libcups2-32bit-debuginfo-2.2.7-150000.3.32.1
libcups2-debuginfo-2.2.7-150000.3.32.1
libcupscgi1-2.2.7-150000.3.32.1
libcupscgi1-debuginfo-2.2.7-150000.3.32.1
libcupsimage2-2.2.7-150000.3.32.1
libcupsimage2-debuginfo-2.2.7-150000.3.32.1
libcupsmime1-2.2.7-150000.3.32.1
libcupsmime1-debuginfo-2.2.7-150000.3.32.1
libcupsppdc1-2.2.7-150000.3.32.1
libcupsppdc1-debuginfo-2.2.7-150000.3.32.1
References:
https://www.suse.com/security/cve/CVE-2022-26691.html
https://bugzilla.suse.com/1199474
1
0
SUSE-SU-2022:1844-1: moderate: Security update for fribidi
by opensuse-security@opensuse.org 25 May '22
by opensuse-security@opensuse.org 25 May '22
25 May '22
SUSE Security Update: Security update for fribidi
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1844-1
Rating: moderate
References: #1196147 #1196148 #1196150
Cross-References: CVE-2022-25308 CVE-2022-25309 CVE-2022-25310
CVSS scores:
CVE-2022-25308 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
CVE-2022-25309 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-25310 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for fribidi fixes the following issues:
- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode
(bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in
fribidi_remove_bidi_marks (bsc#1196150).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1844=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1844=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1844=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1844=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
fribidi-1.0.5-150200.3.6.1
fribidi-debuginfo-1.0.5-150200.3.6.1
fribidi-debugsource-1.0.5-150200.3.6.1
fribidi-devel-1.0.5-150200.3.6.1
libfribidi0-1.0.5-150200.3.6.1
libfribidi0-debuginfo-1.0.5-150200.3.6.1
- openSUSE Leap 15.3 (x86_64):
libfribidi0-32bit-1.0.5-150200.3.6.1
libfribidi0-32bit-debuginfo-1.0.5-150200.3.6.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (x86_64):
fribidi-debugsource-1.0.5-150200.3.6.1
libfribidi0-32bit-1.0.5-150200.3.6.1
libfribidi0-32bit-debuginfo-1.0.5-150200.3.6.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
fribidi-1.0.5-150200.3.6.1
fribidi-debuginfo-1.0.5-150200.3.6.1
fribidi-debugsource-1.0.5-150200.3.6.1
fribidi-devel-1.0.5-150200.3.6.1
libfribidi0-1.0.5-150200.3.6.1
libfribidi0-debuginfo-1.0.5-150200.3.6.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
fribidi-debuginfo-1.0.5-150200.3.6.1
fribidi-debugsource-1.0.5-150200.3.6.1
libfribidi0-1.0.5-150200.3.6.1
libfribidi0-debuginfo-1.0.5-150200.3.6.1
References:
https://www.suse.com/security/cve/CVE-2022-25308.html
https://www.suse.com/security/cve/CVE-2022-25309.html
https://www.suse.com/security/cve/CVE-2022-25310.html
https://bugzilla.suse.com/1196147
https://bugzilla.suse.com/1196148
https://bugzilla.suse.com/1196150
1
0
SUSE-SU-2022:1842-1: moderate: Security update for redis
by opensuse-security@opensuse.org 25 May '22
by opensuse-security@opensuse.org 25 May '22
25 May '22
SUSE Security Update: Security update for redis
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1842-1
Rating: moderate
References: #1198952 #1198953
Cross-References: CVE-2022-24735 CVE-2022-24736
CVSS scores:
CVE-2022-24735 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-24735 (SUSE): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVE-2022-24736 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24736 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for redis fixes the following issues:
- CVE-2022-24735: Fixed Lua code injection (bsc#1198952).
- CVE-2022-24736: Fixed Lua NULL pointer dereference (bsc#1198953).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1842=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1842=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
redis-6.0.14-150200.6.11.1
redis-debuginfo-6.0.14-150200.6.11.1
redis-debugsource-6.0.14-150200.6.11.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
redis-6.0.14-150200.6.11.1
redis-debuginfo-6.0.14-150200.6.11.1
redis-debugsource-6.0.14-150200.6.11.1
References:
https://www.suse.com/security/cve/CVE-2022-24735.html
https://www.suse.com/security/cve/CVE-2022-24736.html
https://bugzilla.suse.com/1198952
https://bugzilla.suse.com/1198953
1
0
SUSE-SU-2022:1840-1: moderate: Security update for kernel-firmware
by opensuse-security@opensuse.org 25 May '22
by opensuse-security@opensuse.org 25 May '22
25 May '22
SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1840-1
Rating: moderate
References: #1199459 #1199470
Cross-References: CVE-2021-26312 CVE-2021-26339 CVE-2021-26342
CVE-2021-26347 CVE-2021-26348 CVE-2021-26349
CVE-2021-26350 CVE-2021-26364 CVE-2021-26372
CVE-2021-26373 CVE-2021-26375 CVE-2021-26376
CVE-2021-26378 CVE-2021-26388 CVE-2021-46744
CVSS scores:
CVE-2021-26312 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-26339 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26339 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26342 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-26342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVE-2021-26347 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26348 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-26349 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-26350 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-46744 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update for kernel-firmware fixes the following issues:
Update AMD ucode and SEV firmware
- (CVE-2021-26339, CVE-2021-26373, CVE-2021-26347, CVE-2021-26376,
CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339,
CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349,
CVE-2021-26364, CVE-2021-26312, CVE-2021-26350, CVE-2021-46744,
bsc#1199459, bsc#1199470)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1840=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1840=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1840=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1840=1
Package List:
- openSUSE Leap 15.3 (noarch):
kernel-firmware-20210208-150300.4.10.1
kernel-firmware-all-20210208-150300.4.10.1
kernel-firmware-amdgpu-20210208-150300.4.10.1
kernel-firmware-ath10k-20210208-150300.4.10.1
kernel-firmware-ath11k-20210208-150300.4.10.1
kernel-firmware-atheros-20210208-150300.4.10.1
kernel-firmware-bluetooth-20210208-150300.4.10.1
kernel-firmware-bnx2-20210208-150300.4.10.1
kernel-firmware-brcm-20210208-150300.4.10.1
kernel-firmware-chelsio-20210208-150300.4.10.1
kernel-firmware-dpaa2-20210208-150300.4.10.1
kernel-firmware-i915-20210208-150300.4.10.1
kernel-firmware-intel-20210208-150300.4.10.1
kernel-firmware-iwlwifi-20210208-150300.4.10.1
kernel-firmware-liquidio-20210208-150300.4.10.1
kernel-firmware-marvell-20210208-150300.4.10.1
kernel-firmware-media-20210208-150300.4.10.1
kernel-firmware-mediatek-20210208-150300.4.10.1
kernel-firmware-mellanox-20210208-150300.4.10.1
kernel-firmware-mwifiex-20210208-150300.4.10.1
kernel-firmware-network-20210208-150300.4.10.1
kernel-firmware-nfp-20210208-150300.4.10.1
kernel-firmware-nvidia-20210208-150300.4.10.1
kernel-firmware-platform-20210208-150300.4.10.1
kernel-firmware-prestera-20210208-150300.4.10.1
kernel-firmware-qlogic-20210208-150300.4.10.1
kernel-firmware-radeon-20210208-150300.4.10.1
kernel-firmware-realtek-20210208-150300.4.10.1
kernel-firmware-serial-20210208-150300.4.10.1
kernel-firmware-sound-20210208-150300.4.10.1
kernel-firmware-ti-20210208-150300.4.10.1
kernel-firmware-ueagle-20210208-150300.4.10.1
kernel-firmware-usb-network-20210208-150300.4.10.1
ucode-amd-20210208-150300.4.10.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
kernel-firmware-20210208-150300.4.10.1
kernel-firmware-brcm-20210208-150300.4.10.1
ucode-amd-20210208-150300.4.10.1
- SUSE Linux Enterprise Micro 5.2 (noarch):
kernel-firmware-all-20210208-150300.4.10.1
kernel-firmware-amdgpu-20210208-150300.4.10.1
kernel-firmware-ath10k-20210208-150300.4.10.1
kernel-firmware-ath11k-20210208-150300.4.10.1
kernel-firmware-atheros-20210208-150300.4.10.1
kernel-firmware-bluetooth-20210208-150300.4.10.1
kernel-firmware-bnx2-20210208-150300.4.10.1
kernel-firmware-brcm-20210208-150300.4.10.1
kernel-firmware-chelsio-20210208-150300.4.10.1
kernel-firmware-dpaa2-20210208-150300.4.10.1
kernel-firmware-i915-20210208-150300.4.10.1
kernel-firmware-intel-20210208-150300.4.10.1
kernel-firmware-iwlwifi-20210208-150300.4.10.1
kernel-firmware-liquidio-20210208-150300.4.10.1
kernel-firmware-marvell-20210208-150300.4.10.1
kernel-firmware-media-20210208-150300.4.10.1
kernel-firmware-mediatek-20210208-150300.4.10.1
kernel-firmware-mellanox-20210208-150300.4.10.1
kernel-firmware-mwifiex-20210208-150300.4.10.1
kernel-firmware-network-20210208-150300.4.10.1
kernel-firmware-nfp-20210208-150300.4.10.1
kernel-firmware-nvidia-20210208-150300.4.10.1
kernel-firmware-platform-20210208-150300.4.10.1
kernel-firmware-prestera-20210208-150300.4.10.1
kernel-firmware-qlogic-20210208-150300.4.10.1
kernel-firmware-radeon-20210208-150300.4.10.1
kernel-firmware-realtek-20210208-150300.4.10.1
kernel-firmware-serial-20210208-150300.4.10.1
kernel-firmware-sound-20210208-150300.4.10.1
kernel-firmware-ti-20210208-150300.4.10.1
kernel-firmware-ueagle-20210208-150300.4.10.1
kernel-firmware-usb-network-20210208-150300.4.10.1
ucode-amd-20210208-150300.4.10.1
- SUSE Linux Enterprise Micro 5.1 (noarch):
kernel-firmware-all-20210208-150300.4.10.1
kernel-firmware-amdgpu-20210208-150300.4.10.1
kernel-firmware-ath10k-20210208-150300.4.10.1
kernel-firmware-ath11k-20210208-150300.4.10.1
kernel-firmware-atheros-20210208-150300.4.10.1
kernel-firmware-bluetooth-20210208-150300.4.10.1
kernel-firmware-bnx2-20210208-150300.4.10.1
kernel-firmware-brcm-20210208-150300.4.10.1
kernel-firmware-chelsio-20210208-150300.4.10.1
kernel-firmware-dpaa2-20210208-150300.4.10.1
kernel-firmware-i915-20210208-150300.4.10.1
kernel-firmware-intel-20210208-150300.4.10.1
kernel-firmware-iwlwifi-20210208-150300.4.10.1
kernel-firmware-liquidio-20210208-150300.4.10.1
kernel-firmware-marvell-20210208-150300.4.10.1
kernel-firmware-media-20210208-150300.4.10.1
kernel-firmware-mediatek-20210208-150300.4.10.1
kernel-firmware-mellanox-20210208-150300.4.10.1
kernel-firmware-mwifiex-20210208-150300.4.10.1
kernel-firmware-network-20210208-150300.4.10.1
kernel-firmware-nfp-20210208-150300.4.10.1
kernel-firmware-nvidia-20210208-150300.4.10.1
kernel-firmware-platform-20210208-150300.4.10.1
kernel-firmware-prestera-20210208-150300.4.10.1
kernel-firmware-qlogic-20210208-150300.4.10.1
kernel-firmware-radeon-20210208-150300.4.10.1
kernel-firmware-realtek-20210208-150300.4.10.1
kernel-firmware-serial-20210208-150300.4.10.1
kernel-firmware-sound-20210208-150300.4.10.1
kernel-firmware-ti-20210208-150300.4.10.1
kernel-firmware-ueagle-20210208-150300.4.10.1
kernel-firmware-usb-network-20210208-150300.4.10.1
ucode-amd-20210208-150300.4.10.1
References:
https://www.suse.com/security/cve/CVE-2021-26312.html
https://www.suse.com/security/cve/CVE-2021-26339.html
https://www.suse.com/security/cve/CVE-2021-26342.html
https://www.suse.com/security/cve/CVE-2021-26347.html
https://www.suse.com/security/cve/CVE-2021-26348.html
https://www.suse.com/security/cve/CVE-2021-26349.html
https://www.suse.com/security/cve/CVE-2021-26350.html
https://www.suse.com/security/cve/CVE-2021-26364.html
https://www.suse.com/security/cve/CVE-2021-26372.html
https://www.suse.com/security/cve/CVE-2021-26373.html
https://www.suse.com/security/cve/CVE-2021-26375.html
https://www.suse.com/security/cve/CVE-2021-26376.html
https://www.suse.com/security/cve/CVE-2021-26378.html
https://www.suse.com/security/cve/CVE-2021-26388.html
https://www.suse.com/security/cve/CVE-2021-46744.html
https://bugzilla.suse.com/1199459
https://bugzilla.suse.com/1199470
1
0
openSUSE-SU-2022:0145-1: moderate: Security update for cacti, cacti-spine
by opensuse-security@opensuse.org 24 May '22
by opensuse-security@opensuse.org 24 May '22
24 May '22
openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0145-1
Rating: moderate
References: #1192408 #1196692
Cross-References: CVE-2022-0730
CVSS scores:
CVE-2022-0730 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12-SP3
SUSE Linux Enterprise Server for SAP Applications 12-SP4
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Package Hub for SUSE Linux Enterprise 12
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
cacti-spine was updated to 1.2.20:
* Add support for newer versions of MySQL/MariaDB
* When checking for uptime of device, don't assume a non-response is
always fatal
* Fix description and command trunctation issues
* Improve spine performance when only one snmp agent port is in use
cacti-spine 1.2.19:
* Fix 1ssues with polling loop may skip some datasources
* Fix ping no longer works due to hostname changes
* Fix RRD steps are not always calculated correctly
* Fix unable to build when DES no longer supported
* Fix IPv6 devices are not properly parsed
* Reduce a number of compiler warnings
* Fix compiler warnings due to lack of return in thread_mutex_trylock
* Fix Spine will not look at non-timetics uptime when sysUpTimeInstance
overflows
* Improve performance of Cacti poller on heavily loaded systems
cacti-spine 1.2.20:
* Add support for newer versions of MySQL/MariaDB
* When checking for uptime of device, don't assume a non-response is
always fatal
* Fix description and command trunctation issues
* Improve spine performance when only one snmp agent port is in use
cacti was updated to 1.2.20:
* Security fix for CVE-2022-0730, boo#1196692 Under certain ldap
conditions, Cacti authentication can be bypassed with certain
credential types.
* Security fix: Device, Graph, Graph Template, and Graph Items may be
vulnerable to XSS issues
* Security fix: Lockout policies are not properly applied to LDAP and
Domain Users
* Security fix: When using 'remember me' option, incorrect realm may be
selected
* Security fix: User and Group maintenance are vulnerable to SQL attacks
* Security fix: Color Templates are vulnerable to XSS attack
* Features:
* When creating a Data Source Profile, allow additional choices for
Heartbeat
* Change select all options to use Font Awesome icons
* Improve spine performance by storing the total number of system
snmp_ports in use
* Prevent Template User Accounts from being Removed
* When managing by users, allow filtering by Realm
* Allow plugins to supply template account names
* When viewing logs, additional message types should be filterable
* When creating a Graph Template Item, allow filtering by Data Template
* Allow language handler to be selected via UI
* Updated Device packages for Synology, Citrix NetScaler, Cisco
ASA/Cisco
* Add Advanced Ping Graph Template to initial Installable templates
* Add LDAP Debug Mode option
* Allow Reports to include devices not on a Tree
* Allow Basic Authentication to display custom failure message
* Fix: When replicating data during installation/upgrade, system may
appear to hang
* Fix: Graph Template Items may have duplicated entries
* Fix: Unable to Save Graph Settings
* Fix: Script Server may crash if an OID is missing or unavailable
* Fix: When system-wide polling is disabled, remote pollers may fail to
sync changed settings
* Fix: When updating poller name, duplicate name protection may be over
zealous
* Fix: Titles may show "Missing Datasource" incorectly
* Fix: Checking for MIB Cache can cause crashes
* Fix: Polling cycles may not always complete as expected
* Fix: When viewing graph data, non-numeric values may appear
* Fix: Utilities view has calculation errors when there are no data
sources
* Fix: When editing Reports, drag and drop may not function as intended
* Fix: When data drive is full, viewing a Graph can result in errors
* Various other bug fixes
cacti 1.2.19:
* Further fixes for grave character security protection (boo#1192408)
* Fix Over aggressive escaping causing menu visibility issues on Create
Device page
* Add SHA256 and AES256 security levels for SNMP polling
* Import graph template(Preview Only) show color_id new value as a blank
area
* Fix Editing graphs errors due to missing sequence
* Fix 2hen hovering over a Tree Graph, row shows same highlighting as
Graph Edit screen
* Fix 2hen RealTime is not active, console errors may appear
* Fix race conditions may occur when multiple RRDtool processes are
running
* Fix errors creating graphs from templates
* Fix errors when duplicating reports
* Fix Boost may be blocked by overflowing poller_output table
* Fix Template import may be blocked due to unmet dependency warnings
with snmp ports
* Fix Newer MySQL versions may error if committing a transaction when
not in one
* Fix SNMP Agent may not find a cache item
* Fix Correct issues running under PHP 8.x
* Fix When polling is disabled, boost may crash and creates many arch
tables
* Fix When poller runs, memory tables may not always be present
* Fix Timezones may sometimes be incorrectly calculated
* Fix Allow monitoring IPv6 with interface graphs
* Fix When a data source uses a Data Input Method, those without a
mapping should be flagged
* Fix When RRDfile is not yet created, errors may appear when displaying
the graph
* Fix Cacti missing key indexes that result in Preset pages slowdowns
* Fix Data Sources page shows no name when Data Source has no name cache
* Fix db_update_table function can not alter table from signed to
unsigned
* Fix data remains in poller_output table even if it's flushed to rrd
files
* Fix Parameter list for lib/database.php:db_connect_real() is not
correct in 3 places
* Fix Offset is a reserved word in MariaDB 10.6 affecting Report
* Fix Rendering large trees slowed due to lack of permission caching
* Fix Error on interpretation of snmpUtime, when to big
* Fix Applying right axis formatting creates an error-image
* Fix Unable to Save Graph Settings from the Graphs pages
* Fix Graph Template Cache is nullified too often when Graph Automation
is running
* Fix When Adding a Data Query to a Device, no Progress Spinner is shown
* Fix New Browser Breaks Plugins that depend on non UTC date time data
* Fix errors when testing remote poller connectivity
* Fix errors when renaming poller
* Fix Removing spikes by Variance does not appear to be working beyond
the first RRA
* Fix LDAP API lacks timeout options leading to bad login experiences
* Add a normal/wrap class for general use
* Limit File Types available for Template Import operations
* Fix Cacti does not provide an option of providing a client side
certificate for LDAP/AD authentication
* Support Stronger Encryption Available Starting in Net-SNMP v5.8
* Allow Cacti to use multiple possible LDAP servers
* Add a 15 minute polling/sampling interval
* Provide additional admin email notifications
* Add warnings for undesired changes to plugin hook return values
* When creating a Graph, make testing the Data Sources optional by
Template
* Update phpseclib to 2.0.33
* Update jstree.js to 3.3.12
* Improve performance of Cacti poller on heavily loaded systems
* MariaDB recommendations need some tuning for recent updates
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-145=1
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2022-145=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
cacti-spine-1.2.20-bp153.2.9.1
- openSUSE Backports SLE-15-SP3 (noarch):
cacti-1.2.20-bp153.2.9.1
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
cacti-spine-1.2.20-20.1
- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):
cacti-1.2.20-26.1
References:
https://www.suse.com/security/cve/CVE-2022-0730.html
https://bugzilla.suse.com/1192408
https://bugzilla.suse.com/1196692
1
0
SUSE-SU-2022:1829-1: moderate: Security update for go1.18
by opensuse-security@opensuse.org 24 May '22
by opensuse-security@opensuse.org 24 May '22
24 May '22
SUSE Security Update: Security update for go1.18
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1829-1
Rating: moderate
References: #1193742 #1199413
Cross-References: CVE-2022-29526
CVSS scores:
CVE-2022-29526 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for go1.18 fixes the following issues:
- CVE-2022-29526: Fixed faccessat() system call operation that checked the
wrong group (bsc#1199413).
- go1.18.2 (released 2022-05-10) (bsc#1193742).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1829=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1829=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1829=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1829=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.2-150000.1.17.1
go1.18-doc-1.18.2-150000.1.17.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.18-race-1.18.2-150000.1.17.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.2-150000.1.17.1
go1.18-doc-1.18.2-150000.1.17.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.18-race-1.18.2-150000.1.17.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.2-150000.1.17.1
go1.18-doc-1.18.2-150000.1.17.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.18-race-1.18.2-150000.1.17.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.2-150000.1.17.1
go1.18-doc-1.18.2-150000.1.17.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.18-race-1.18.2-150000.1.17.1
References:
https://www.suse.com/security/cve/CVE-2022-29526.html
https://bugzilla.suse.com/1193742
https://bugzilla.suse.com/1199413
1
0
SUSE-SU-2022:1830-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 24 May '22
by opensuse-security@opensuse.org 24 May '22
24 May '22
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1830-1
Rating: important
References: #1199768
Cross-References: CVE-2022-1529 CVE-2022-1802
CVSS scores:
CVE-2022-1529 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1802 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):
- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing,
leading to prototype pollution
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1830=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1830=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1830=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1830=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1830=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1830=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1830=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1830=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1830=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1830=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1830=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1830=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1830=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-branding-upstream-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-branding-upstream-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Manager Proxy 4.1 (x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le x86_64):
MozillaFirefox-devel-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le x86_64):
MozillaFirefox-devel-91.9.1-150200.152.40.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
MozillaFirefox-91.9.1-150200.152.40.1
MozillaFirefox-debuginfo-91.9.1-150200.152.40.1
MozillaFirefox-debugsource-91.9.1-150200.152.40.1
MozillaFirefox-devel-91.9.1-150200.152.40.1
MozillaFirefox-translations-common-91.9.1-150200.152.40.1
MozillaFirefox-translations-other-91.9.1-150200.152.40.1
References:
https://www.suse.com/security/cve/CVE-2022-1529.html
https://www.suse.com/security/cve/CVE-2022-1802.html
https://bugzilla.suse.com/1199768
1
0
SUSE-SU-2022:1831-1: important: Security update for slurm_20_11
by opensuse-security@opensuse.org 24 May '22
by opensuse-security@opensuse.org 24 May '22
24 May '22
SUSE Security Update: Security update for slurm_20_11
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1831-1
Rating: important
References: #1199278 #1199279
Cross-References: CVE-2022-29500 CVE-2022-29501
CVSS scores:
CVE-2022-29500 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-29500 (SUSE): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2022-29501 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-29501 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for slurm_20_11 fixes the following issues:
- CVE-2022-29500: Fixed architectural flaw that could have been exploited
to allow an unprivileged user to execute arbitrary processes as root
(bsc#1199278).
- CVE-2022-29501: Fixed a problem that an unprivileged user could have
sent data to arbitrary unix socket as root (bsc#1199279).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1831=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1831=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1831=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1831=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libnss_slurm2_20_11-20.11.9-150200.6.10.1
libnss_slurm2_20_11-debuginfo-20.11.9-150200.6.10.1
libpmi0_20_11-20.11.9-150200.6.10.1
libpmi0_20_11-debuginfo-20.11.9-150200.6.10.1
perl-slurm_20_11-20.11.9-150200.6.10.1
perl-slurm_20_11-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-auth-none-20.11.9-150200.6.10.1
slurm_20_11-auth-none-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-config-20.11.9-150200.6.10.1
slurm_20_11-config-man-20.11.9-150200.6.10.1
slurm_20_11-cray-20.11.9-150200.6.10.1
slurm_20_11-cray-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-debugsource-20.11.9-150200.6.10.1
slurm_20_11-devel-20.11.9-150200.6.10.1
slurm_20_11-doc-20.11.9-150200.6.10.1
slurm_20_11-hdf5-20.11.9-150200.6.10.1
slurm_20_11-hdf5-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-lua-20.11.9-150200.6.10.1
slurm_20_11-lua-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-munge-20.11.9-150200.6.10.1
slurm_20_11-munge-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-node-20.11.9-150200.6.10.1
slurm_20_11-node-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-openlava-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-plugins-20.11.9-150200.6.10.1
slurm_20_11-plugins-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-rest-20.11.9-150200.6.10.1
slurm_20_11-rest-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-seff-20.11.9-150200.6.10.1
slurm_20_11-sjstat-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-sql-20.11.9-150200.6.10.1
slurm_20_11-sql-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-sview-20.11.9-150200.6.10.1
slurm_20_11-sview-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-torque-20.11.9-150200.6.10.1
slurm_20_11-torque-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-webdoc-20.11.9-150200.6.10.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libnss_slurm2_20_11-20.11.9-150200.6.10.1
libnss_slurm2_20_11-debuginfo-20.11.9-150200.6.10.1
libpmi0_20_11-20.11.9-150200.6.10.1
libpmi0_20_11-debuginfo-20.11.9-150200.6.10.1
perl-slurm_20_11-20.11.9-150200.6.10.1
perl-slurm_20_11-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-auth-none-20.11.9-150200.6.10.1
slurm_20_11-auth-none-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-config-20.11.9-150200.6.10.1
slurm_20_11-config-man-20.11.9-150200.6.10.1
slurm_20_11-cray-20.11.9-150200.6.10.1
slurm_20_11-cray-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-debugsource-20.11.9-150200.6.10.1
slurm_20_11-devel-20.11.9-150200.6.10.1
slurm_20_11-doc-20.11.9-150200.6.10.1
slurm_20_11-hdf5-20.11.9-150200.6.10.1
slurm_20_11-hdf5-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-lua-20.11.9-150200.6.10.1
slurm_20_11-lua-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-munge-20.11.9-150200.6.10.1
slurm_20_11-munge-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-node-20.11.9-150200.6.10.1
slurm_20_11-node-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-openlava-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-plugins-20.11.9-150200.6.10.1
slurm_20_11-plugins-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-rest-20.11.9-150200.6.10.1
slurm_20_11-rest-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-seff-20.11.9-150200.6.10.1
slurm_20_11-sjstat-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-sql-20.11.9-150200.6.10.1
slurm_20_11-sql-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-sview-20.11.9-150200.6.10.1
slurm_20_11-sview-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-torque-20.11.9-150200.6.10.1
slurm_20_11-torque-debuginfo-20.11.9-150200.6.10.1
slurm_20_11-webdoc-20.11.9-150200.6.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libnss_slurm2_20_11-20.11.9-150200.6.10.1
libpmi0_20_11-20.11.9-150200.6.10.1
libslurm36-20.11.9-150200.6.10.1
libslurm36-debuginfo-20.11.9-150200.6.10.1
perl-slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-auth-none-20.11.9-150200.6.10.1
slurm_20_11-config-20.11.9-150200.6.10.1
slurm_20_11-config-man-20.11.9-150200.6.10.1
slurm_20_11-devel-20.11.9-150200.6.10.1
slurm_20_11-doc-20.11.9-150200.6.10.1
slurm_20_11-lua-20.11.9-150200.6.10.1
slurm_20_11-munge-20.11.9-150200.6.10.1
slurm_20_11-node-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-20.11.9-150200.6.10.1
slurm_20_11-plugins-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-20.11.9-150200.6.10.1
slurm_20_11-sql-20.11.9-150200.6.10.1
slurm_20_11-sview-20.11.9-150200.6.10.1
slurm_20_11-torque-20.11.9-150200.6.10.1
slurm_20_11-webdoc-20.11.9-150200.6.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libnss_slurm2_20_11-20.11.9-150200.6.10.1
libpmi0_20_11-20.11.9-150200.6.10.1
libslurm36-20.11.9-150200.6.10.1
libslurm36-debuginfo-20.11.9-150200.6.10.1
perl-slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-20.11.9-150200.6.10.1
slurm_20_11-auth-none-20.11.9-150200.6.10.1
slurm_20_11-config-20.11.9-150200.6.10.1
slurm_20_11-config-man-20.11.9-150200.6.10.1
slurm_20_11-devel-20.11.9-150200.6.10.1
slurm_20_11-doc-20.11.9-150200.6.10.1
slurm_20_11-lua-20.11.9-150200.6.10.1
slurm_20_11-munge-20.11.9-150200.6.10.1
slurm_20_11-node-20.11.9-150200.6.10.1
slurm_20_11-pam_slurm-20.11.9-150200.6.10.1
slurm_20_11-plugins-20.11.9-150200.6.10.1
slurm_20_11-slurmdbd-20.11.9-150200.6.10.1
slurm_20_11-sql-20.11.9-150200.6.10.1
slurm_20_11-sview-20.11.9-150200.6.10.1
slurm_20_11-torque-20.11.9-150200.6.10.1
slurm_20_11-webdoc-20.11.9-150200.6.10.1
References:
https://www.suse.com/security/cve/CVE-2022-29500.html
https://www.suse.com/security/cve/CVE-2022-29501.html
https://bugzilla.suse.com/1199278
https://bugzilla.suse.com/1199279
1
0