openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
July 2022
- 1 participants
- 95 discussions
SUSE-SU-2022:2291-1: important: Security update for python310
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for python310
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2291-1
Rating: important
References: #1198511
Cross-References: CVE-2015-20107
CVSS scores:
CVE-2015-20107 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2015-20107 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
Affected Products:
SUSE Linux Enterprise Module for Python3 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python310 fixes the following issues:
- CVE-2015-20107: avoid command injection in the mailcap module
(bsc#1198511).
- Update to 3.10.5:
- Core and Builtins
- gh-93418: Fixed an assert where an f-string has an equal sign '='
following an expression, but there's no trailing brace. For example,
f"{i=".
- gh-91924: Fix __ltrace__ debug feature if the stdout encoding is not
UTF-8. Patch by Victor Stinner.
- gh-93061: Backward jumps after async for loops are no longer given
dubious line numbers.
- gh-93065: Fix contextvars HAMT implementation to handle iteration
over deep trees.
- The bug was discovered and fixed by Eli Libman. See
MagicStack/immutables#84 for more details.
- gh-92311: Fixed a bug where setting frame.f_lineno to jump
over a list comprehension could misbehave or crash.
- gh-92112: Fix crash triggered by an evil custom mro() on a metaclass.
- gh-92036: Fix a crash in subinterpreters related to the garbage
collector. When a subinterpreter is deleted, untrack all objects
tracked by its GC. To prevent a crash in deallocator functions
expecting objects to be tracked by the GC, leak a strong reference
to these objects on purpose, so they are never deleted and their
deallocator functions are not called. Patch by Victor Stinner.
- gh-91421: Fix a potential integer overflow in _Py_DecodeUTF8Ex.
- bpo-47212: Raise IndentationError instead of SyntaxError for a bare
except with no following indent. Improve SyntaxError locations for
an un-parenthesized generator used as arguments. Patch by Matthieu
Dartiailh.
- bpo-47182: Fix a crash when using a named unicode character like
"\N{digit nine}" after the main interpreter has been initialized a
second time.
- bpo-47117: Fix a crash if we fail to decode characters in
interactive mode if the tokenizer buffers are uninitialized. Patch
by Pablo Galindo.
- bpo-39829: Removed the __len__() call when initializing a list and
moved initializing to list_extend. Patch by Jeremiah Pascual.
- bpo-46962: Classes and functions that unconditionally declared their
docstrings ignoring the
--without-doc-strings compilation flag no longer do so.
- The classes affected are ctypes.UnionType, pickle.PickleBuffer,
testcapi.RecursingInfinitelyError, and types.GenericAlias.
- The functions affected are 24 methods in ctypes.
- Patch by Oleg Iarygin.
- bpo-36819: Fix crashes in built-in encoders with error handlers that
return position less or equal than the starting position of
non-encodable characters.
- Library
- gh-93156: Accessing the pathlib.PurePath.parents sequence
of an absolute path using negative index values produced incorrect
results.
- gh-89973: Fix re.error raised in fnmatch if the pattern contains a
character range with upper bound lower than lower bound (e.g.
[c-a]). Now such ranges are interpreted as empty ranges.
- gh-93010: In a very special case, the email package tried to append
the nonexistent InvalidHeaderError to the defect list. It should
have been InvalidHeaderDefect.
- gh-92839: Fixed crash resulting from calling bisect.insort() or
bisect.insort_left() with the key argument not equal to None.
- gh-91581: utcfromtimestamp() no longer attempts to resolve fold in
the pure Python implementation, since the fold is never 1 in UTC. In
addition to being slightly faster in the common case, this also
prevents some errors when the timestamp is close to datetime.min.
Patch by Paul Ganssle.
- gh-92530: Fix an issue that occurred after interrupting
threading.Condition.notify().
- gh-92049: Forbid pickling constants re._constants.SUCCESS etc.
Previously, pickling did not fail, but the result could not be
unpickled.
- bpo-47029: Always close the read end of the pipe used by
multiprocessing.Queue after the last write of buffered data to the
write end of the pipe to avoid BrokenPipeError at garbage collection
and at multiprocessing.Queue.close() calls. Patch by G��ry Ogam.
- gh-91401: Provide a fail-safe way to disable subprocess use
of vfork() via a private subprocess._USE_VFORK attribute. While
there is currently no known need for this, if you find a need please only
set it to False. File a CPython issue as to why you needed it and link to
that from a comment in your code. This attribute is documented as a
footnote in 3.11.
- gh-91910: Add missing f prefix to f-strings in error messages from
the multiprocessing and asyncio modules.
- gh-91810: ElementTree method write() and function tostring() now use
the text file's encoding ("UTF-8" if not available) instead of
locale encoding in XML declaration when encoding="unicode" is
specified.
- gh-91832: Add required attribute to argparse.Action repr
output.
- gh-91700: Compilation of regular expression containing a conditional
expression (?(group)...) now raises an appropriate re.error if the
group number refers to not defined group. Previously an internal
RuntimeError was raised.
- gh-91676: Fix unittest.IsolatedAsyncioTestCase to shutdown the per
test event loop executor before returning from its run method so
that a not yet stopped or garbage collected executor state does not
persist beyond the test.
- gh-90568: Parsing \N escapes of Unicode Named Character Sequences in
a regular expression raises now re.error instead of TypeError.
- gh-91595: Fix the comparison of character and integer inside
Tools.gdb.libpython.write_repr(). Patch by Yu Liu.
- gh-90622: Worker processes for
concurrent.futures.ProcessPoolExecutor are no longer spawned on
demand (a feature added in 3.9) when the multiprocessing context
start method is "fork" as that can lead to deadlocks in the child
processes due to a fork happening while threads are running.
- gh-91575: Update case-insensitive matching in the re module to the
latest Unicode version.
- gh-91581: Remove an unhandled error case in the C implementation of
calls to datetime.fromtimestamp with no time zone (i.e. getting a
local time from an epoch timestamp). This should have no user-facing
effect other than giving a possibly more accurate error message when
called with timestamps that fall on 10000-01-01 in the local time.
Patch by Paul Ganssle.
- bpo-47260: Fix os.closerange() potentially being a no-op in a Linux
seccomp sandbox.
- bpo-39064: zipfile.ZipFile now raises zipfile.BadZipFile instead of
ValueError when reading a corrupt zip file in which the central
directory offset is negative.
- bpo-47151: When subprocess tries to use vfork, it now falls back to
fork if vfork returns an error. This allows use in situations where
vfork isn't allowed by the OS kernel.
- bpo-27929: Fix asyncio.loop.sock_connect() to only resolve names for
socket.AF_INET or socket.AF_INET6 families. Resolution may not make
sense for other families, like socket.AF_BLUETOOTH and
socket.AF_UNIX.
- bpo-43323: Fix errors in the email module if the charset itself
contains undecodable/unencodable characters.
- bpo-47101: hashlib.algorithms_available now lists only algorithms
that are provided by activated crypto providers
on OpenSSL 3.0. Legacy algorithms are not listed unless the legacy
provider has been loaded into the default OSSL context.
- bpo-46787: Fix concurrent.futures.ProcessPoolExecutor exception
memory leak
- bpo-45393: Fix the formatting for await x and not x in the
operator precedence table when using the help() system.
- bpo-46415: Fix ipaddress.ip_{address,interface,network} raising
TypeError instead of ValueError if given invalid tuple as address
parameter.
- bpo-28249: Set doctest.DocTest.lineno to None when object does not
have __doc__.
- bpo-45138: Fix a regression in the sqlite3 trace callback where
bound parameters were not expanded in the passed statement string.
The regression was introduced in Python 3.10 by bpo-40318. Patch by
Erlend E. Aasland.
- bpo-44493: Add missing terminated NUL in sockaddr_un's length
- This was potentially observable when using non-abstract AF_UNIX
datagram sockets to processes written in another programming
language.
- bpo-42627: Fix incorrect parsing of Windows registry proxy settings
- bpo-36073: Raise ProgrammingError instead of segfaulting on
recursive usage of cursors in sqlite3 converters. Patch by Sergey
Fedoseev.
- Documentation
- gh-86438: Clarify that -W and PYTHONWARNINGS are matched literally
and case-insensitively, rather than as regular expressions, in
warnings.
- gh-92240: Added release dates for "What's New in Python 3.X" for
3.0, 3.1, 3.2, 3.8 and 3.10
- gh-91888: Add a new gh role to the documentation to link to GitHub
issues.
- gh-91783: Document security issues concerning the use of the
function shutil.unpack_archive()
- gh-91547: Remove "Undocumented modules" page.
- bpo-44347: Clarify the meaning of dirs_exist_ok, a kwarg of
shutil.copytree().
- bpo-38668: Update the introduction to documentation for
os.path to remove warnings that became irrelevant after the
implementations of PEP 383 and PEP 529.
- bpo-47138: Pin Jinja to a version compatible with Sphinx version
3.2.1.
- bpo-46962: All docstrings in code snippets are now wrapped into
PyDoc_STR() to follow the guideline of PEP 7's Documentation Strings
paragraph. Patch by Oleg Iarygin.
- bpo-26792: Improve the docstrings of runpy.run_module() and
runpy.run_path(). Original patch by Andrew Brezovsky.
- bpo-40838: Document that inspect.getdoc(), inspect.getmodule(), and
inspect.getsourcefile() might return None.
- bpo-45790: Adjust inaccurate phrasing in Defining Extension Types:
Tutorial about the ob_base field and the macros used to access its
contents.
- bpo-42340: Document that in some circumstances KeyboardInterrupt may
cause the code to enter an inconsistent state. Provided a sample
workaround to avoid it if needed.
- bpo-41233: Link the errnos referenced in Doc/library/exceptions.rst
to their respective section in Doc/library/errno.rst, and vice
versa. Previously this was
only done for EINTR and InterruptedError. Patch by Yan "yyyyyyyan"
Orestes.
- bpo-38056: Overhaul the Error Handlers documentation in codecs.
- bpo-13553: Document tkinter.Tk args.
- Tests
- gh-92886: Fixing tests that fail when running with
optimizations (-O) in test_imaplib.py.
- gh-92670: Skip test_shutil.TestCopy.test_copyfile_nonexistent_dir
test on AIX as the test uses a trailing slash to force the OS
consider the path as a directory, but on AIX the trailing slash has
no effect and is considered as a file.
- gh-91904: Fix initialization of PYTHONREGRTEST_UNICODE_GUARD which
prevented running regression tests on non-UTF-8 locale.
- gh-91607: Fix test_concurrent_futures to test the correct
multiprocessing start method context in several cases where the test
logic mixed this up.
- bpo-47205: Skip test for sched_getaffinity() and sched_setaffinity()
error case on FreeBSD.
- bpo-47104: Rewrite asyncio.to_thread() tests to use
unittest.IsolatedAsyncioTestCase.
- bpo-29890: Add tests for ipaddress.IPv4Interface and
ipaddress.IPv6Interface construction with tuple arguments. Original
patch and tests by louisom.
- Tools/Demos
- gh-91583: Fix regression in the code generated by Argument Clinic
for functions with the defining_class parameter.
- Update to 3.10.4:
- bpo-46968: Check for the existence of the "sys/auxv.h" header in
faulthandler to avoid compilation problems in systems where this
header doesn't exist. Patch by Pablo Galindo
- bpo-23691: Protect the re.finditer() iterator from re-entering.
- bpo-42369: Fix thread safety of zipfile._SharedFile.tell() to avoid a
"zipfile.BadZipFile: Bad CRC-32 for file" exception when reading a
ZipFile from multiple threads.
- bpo-38256: Fix binascii.crc32() when it is compiled to use zlib'c
crc32 to work properly on inputs 4+GiB in length instead of returning
the wrong result. The workaround prior to this was to always feed the
function data in increments smaller than 4GiB or to just call the zlib
module function.
- bpo-39394: A warning about inline flags not at the start of the
regular expression now contains the position of the flag.
- bpo-47061: Deprecate the various modules listed by PEP 594:
- aifc, asynchat, asyncore, audioop, cgi, cgitb, chunk, crypt, imghdr,
msilib, nntplib, nis, ossaudiodev, pipes, smtpd, sndhdr, spwd, sunau,
telnetlib, uu, xdrlib
- bpo-2604: Fix bug where doctests using globals would fail when run
multiple times.
- bpo-45997: Fix asyncio.Semaphore re-aquiring FIFO order.
- bpo-47022: The asynchat, asyncore and smtpd modules have been
deprecated since at least Python 3.6. Their documentation and
deprecation warnings and have now been updated to note they will
removed in Python 3.12 (PEP 594).
- bpo-46421: Fix a unittest issue where if the command was invoked as
python -m unittest and the filename(s) began with a dot (.), a
ValueError is returned.
- bpo-40296: Fix supporting generic aliases in pydoc.
- Update to 3.10.3:
- bpo-46940: Avoid overriding AttributeError metadata information for
nested attribute access calls. Patch by Pablo Galindo.
- bpo-46852: Rename the private undocumented float.__set_format__()
method to float.__setformat__() to fix a typo introduced in Python
3.7. The method is only used by test_float. Patch by Victor Stinner.
- bpo-46794: Bump up the libexpat version into 2.4.6
- bpo-46820: Fix parsing a numeric literal immediately (without spaces)
followed by "not in" keywords, like in 1not in x. Now the parser only
emits a warning, not a syntax error.
- bpo-46762: Fix an assert failure in debug builds when a '<', '>', or
'=' is the last character in an f-string that's missing a closing
right brace.
- bpo-46724: Make sure that all backwards jumps use the JUMP_ABSOLUTE
instruction, rather than JUMP_FORWARD with an argument of
(2**32)+offset.
- bpo-46732: Correct the docstring for the __bool__() method. Patch by
Jelle Zijlstra.
- bpo-46707: Avoid potential exponential backtracking when producing
some syntax errors involving lots of brackets. Patch by Pablo Galindo.
- bpo-40479: Add a missing call to va_end() in Modules/_hashopenssl.c.
- bpo-46615: When iterating over sets internally in setobject.c, acquire
strong references to the resulting items from the set. This prevents
crashes in corner-cases of various set operations where the set gets
mutated.
- bpo-45773: Remove two invalid "peephole" optimizations from the
bytecode compiler.
- bpo-43721: Fix docstrings of getter, setter, and deleter to clarify
that they create a new copy of the property.
- bpo-46503: Fix an assert when parsing some invalid N escape sequences
in f-strings.
- bpo-46417: Fix a race condition on setting a type __bases__ attribute:
the internal function add_subclass() now gets the
PyTypeObject.tp_subclasses member after calling PyWeakref_NewRef()
which can trigger a garbage collection which can indirectly modify
PyTypeObject.tp_subclasses. Patch by Victor Stinner.
- bpo-46383: Fix invalid signature of _zoneinfo's module_free function
to resolve a crash on wasm32-emscripten platform.
- bpo-46070: Py_EndInterpreter() now explicitly untracks all
objects currently tracked by the GC. Previously, if an object was used
later by another interpreter, calling PyObject_GC_UnTrack() on the
object crashed if the previous
or the next object of the PyGC_Head structure became a dangling
pointer. Patch by Victor Stinner.
- bpo-46339: Fix a crash in the parser when retrieving the error text
for multi-line f-strings expressions that do not start in the first
line of the string. Patch by Pablo Galindo
- bpo-46240: Correct the error message for unclosed parentheses when the
tokenizer doesn't reach the end of the source when the error is
reported. Patch by Pablo Galindo
- bpo-46091: Correctly calculate indentation levels for lines with
whitespace character that are ended by line continuation characters.
Patch by Pablo Galindo
- bpo-43253: Fix a crash when closing transports where the underlying
socket handle is already invalid on the Proactor event loop.
- bpo-47004: Apply bugfixes from importlib_metadata 4.11.3, including
bugfix for EntryPoint.extras, which was returning match objects and
not the extras strings.
- bpo-46985: Upgrade pip wheel bundled with ensurepip (pip 22.0.4)
- bpo-46968: faulthandler: On Linux 5.14 and newer, dynamically
determine size of signal handler stack size CPython allocates using
getauxval(AT_MINSIGSTKSZ). This changes allows for Python extension's
request to Linux kernel to use AMX_TILE instruction set on Sapphire
Rapids Xeon processor to succeed, unblocking use of the ISA in
frameworks.
- bpo-46955: Expose asyncio.base_events.Server as asyncio.Server. Patch
by Stefan Zabka.
- bpo-23325: The signal module no longer assumes that SIG_IGN and
SIG_DFL are small int singletons.
- bpo-46932: Update bundled libexpat to 2.4.7
- bpo-25707: Fixed a file leak in xml.etree.ElementTree.iterparse() when
the iterator is not exhausted. Patch by Jacob Walls.
- bpo-44886: Inherit asyncio proactor datagram transport from
asyncio.DatagramTransport.
- bpo-46827: Support UDP sockets in asyncio.loop.sock_connect() for
selector-based event loops. Patch by Thomas Grainger.
- bpo-46811: Make test suite support Expat >=2.4.5
- bpo-46252: Raise TypeError if ssl.SSLSocket is passed to
transport-based APIs.
- bpo-46784: Fix libexpat symbols collisions with user dynamically
loaded or statically linked libexpat in embedded Python.
- bpo-39327: shutil.rmtree() can now work with VirtualBox shared folders
when running from the guest operating-system.
- bpo-46756: Fix a bug in
urllib.request.HTTPPasswordMgr.find_user_password() and
urllib.request.HTTPPasswordMgrWithPriorAuth.is_authenticated() which
allowed to bypass authorization. For example, access to URI
example.org/foobar was allowed if the user was authorized for URI
example.org/foo.
- bpo-46643: In typing.get_type_hints(), support evaluating stringified
ParamSpecArgs and ParamSpecKwargs annotations. Patch by Gregory
Beauregard.
- bpo-45863: When the tarfile module creates a pax format archive, it
will put an integer representation of timestamps in the ustar header
(if possible) for the benefit of older unarchivers, in addition to the
existing full-precision timestamps in the pax extended header.
- bpo-46676: Make typing.ParamSpec args and kwargs equal to themselves.
Patch by Gregory Beauregard.
- bpo-46672: Fix NameError in asyncio.gather() when initial type check
fails.
- bpo-46655: In typing.get_type_hints(), support evaluating bare
stringified TypeAlias annotations. Patch by Gregory Beauregard.
- bpo-45948: Fixed a discrepancy in the C implementation of the
xml.etree.ElementTree module. Now, instantiating an
xml.etree.ElementTree.XMLParser with a target=None keyword provides a
default xml.etree.ElementTree.TreeBuilder target as the Python
implementation does.
- bpo-46521: Fix a bug in the codeop module that was incorrectly
identifying invalid code involving string quotes as valid code.
- bpo-46581: Brings ParamSpec propagation for GenericAlias in line with
Concatenate (and others).
- bpo-46591: Make the IDLE doc URL on the About IDLE dialog clickable.
- bpo-46400: expat: Update libexpat from 2.4.1 to 2.4.4
- bpo-46487: Add the get_write_buffer_limits method to
asyncio.transports.WriteTransport and to the SSL transport.
- bpo-45173: Note the configparser deprecations will be removed in
Python 3.12.
- bpo-46539: In typing.get_type_hints(), support evaluating stringified
ClassVar and Final annotations inside Annotated. Patch by Gregory
Beauregard.
- bpo-46491: Allow typing.Annotated to wrap typing.Final and
typing.ClassVar. Patch by Gregory Beauregard.
- bpo-46436: Fix command-line option -d/--directory in module
http.server which is ignored when combined with command-line
option --cgi. Patch by G��ry Ogam.
- bpo-41403: Make mock.patch() raise a TypeError with a relevant error
message on invalid arg. Previously it allowed a cryptic AttributeError
to escape.
- bpo-46474: In importlib.metadata.EntryPoint.pattern, avoid potential
REDoS by limiting ambiguity in consecutive whitespace.
- bpo-46469: asyncio generic classes now return types.GenericAlias in
__class_getitem__ instead of the same class.
- bpo-46434: pdb now gracefully handles help when __doc__ is missing,
for example when run with pregenerated optimized .pyc files.
- bpo-46333: The __eq__() and __hash__() methods of typing.ForwardRef
now honor the module parameter of typing.ForwardRef. Forward
references from different modules are now differentiated.
- bpo-46246: Add missing __slots__ to importlib.metadata.DeprecatedList.
Patch by Arie Bovenberg.
- bpo-46266: Improve day constants in calendar.
- Now all constants (MONDAY ... SUNDAY) are documented, tested, and
added to __all__.
- bpo-46232: The ssl module now handles certificates with bit strings in
DN correctly.
- bpo-43118: Fix a bug in inspect.signature() that was causing it to
fail on some subclasses of classes with a __text_signature__
referencing module globals. Patch by Weipeng Hong.
- bpo-26552: Fixed case where failing asyncio.ensure_future() did not
close the coroutine. Patch by Kumar Aditya.
- bpo-21987: Fix an issue with tarfile.TarFile.getmember() getting a
directory name with a trailing slash.
- bpo-20392: Fix inconsistency with uppercase file extensions in
MimeTypes.guess_type(). Patch by Kumar Aditya.
- bpo-46080: Fix exception in argparse help text generation if a
argparse.BooleanOptionalAction argument's default is argparse.SUPPRESS
and it has help specified. Patch by Felix Fontein.
- bpo-44439: Fix .write() method of a member file in ZipFile, when the
input data is an object that supports the buffer protocol, the file
length may be wrong.
- bpo-45703: When a namespace package is imported before another module
from the same namespace is created/installed in a different sys.path
location while the program is running, calling the
importlib.invalidate_caches() function will now also guarantee the new
module is noticed.
- bpo-24959: Fix bug where unittest sometimes drops frames from
tracebacks of exceptions raised in tests.
- bpo-44791: Fix substitution of ParamSpec in Concatenate with different
parameter expressions. Substitution with a list of types returns now a
tuple of types. Substitution with Concatenate returns now a
Concatenate with concatenated lists
of arguments.
- bpo-14156: argparse.FileType now supports an argument of '-' in binary
mode, returning the .buffer attribute of sys.stdin/sys.stdout as
appropriate. Modes including 'x' and 'a' are treated equivalently to
'w' when argument is '-'. Patch contributed by Josh Rosenberg
- bpo-46463: Fixes escape4chm.py script used when building the CHM
documentation file
- bpo-46913: Fix test_faulthandler.test_sigfpe() if Python is built with
undefined behavior sanitizer (UBSAN): disable UBSAN on the
faulthandler_sigfpe() function. Patch by Victor Stinner.
- bpo-46708: Prevent default asyncio event loop policy modification
warning after test_asyncio execution.
- bpo-46678: The function make_legacy_pyc in
Lib/test/support/import_helper.py no longer fails when
PYTHONPYCACHEPREFIX is set to a directory on a different device from
where tempfiles are stored.
- bpo-46616: Ensures test_importlib.test_windows cleans up registry keys
after completion.
- bpo-44359: test_ftplib now silently ignores socket errors to prevent
logging unhandled threading exceptions. Patch by Victor Stinner.
- bpo-46542: Fix a Python crash in test_lib2to3 when using Python built
in debug mode: limit the recursion limit. Patch by Victor Stinner.
- bpo-46576: test_peg_generator now disables compiler
optimization when testing compilation of its own C extensions to
significantly speed up the testing on non-debug builds of CPython.
- bpo-46542: Fix test_json tests checking for RecursionError: modify
these tests to use support.infinite_recursion(). Patch by Victor
Stinner.
- bpo-13886: Skip test_builtin PTY tests on non-ASCII characters if the
readline module is loaded. The readline module changes input()
behavior, but test_builtin is not intented to test the readline
module. Patch by Victor Stinner.
- bpo-38472: Fix GCC detection in setup.py when cross-compiling. The C
compiler is now run with LC_ALL=C. Previously, the detection failed
with a German locale.
- bpo-46513: configure no longer uses AC_C_CHAR_UNSIGNED macro and
pyconfig.h no longer defines reserved symbol __CHAR_UNSIGNED__.
- bpo-45296: Clarify close, quit, and exit in IDLE. In the File menu,
'Close' and 'Exit' are now 'Close Window' (the current
one) and 'Exit' is now 'Exit IDLE' (by closing all windows). In Shell,
'quit()' and 'exit()' mean 'close Shell'. If there are no other
windows, this also exits IDLE.
- bpo-45447: Apply IDLE syntax highlighting to pyi files. Patch by Alex
Waygood and Terry Jan Reedy.
- bpo-46433: The internal function _PyType_GetModuleByDef now correctly
handles inheritance patterns involving static types.
- bpo-14916: Fixed bug in the tokenizer that prevented
PyRun_InteractiveOne from parsing from the provided FD.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2291=1
- SUSE Linux Enterprise Module for Python3 15-SP4:
zypper in -t patch SUSE-SLE-Module-Python3-15-SP4-2022-2291=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libpython3_10-1_0-3.10.5-150400.4.7.1
libpython3_10-1_0-debuginfo-3.10.5-150400.4.7.1
python310-3.10.5-150400.4.7.1
python310-base-3.10.5-150400.4.7.1
python310-base-debuginfo-3.10.5-150400.4.7.1
python310-core-debugsource-3.10.5-150400.4.7.1
python310-curses-3.10.5-150400.4.7.1
python310-curses-debuginfo-3.10.5-150400.4.7.1
python310-dbm-3.10.5-150400.4.7.1
python310-dbm-debuginfo-3.10.5-150400.4.7.1
python310-debuginfo-3.10.5-150400.4.7.1
python310-debugsource-3.10.5-150400.4.7.1
python310-devel-3.10.5-150400.4.7.1
python310-doc-3.10.5-150400.4.7.1
python310-doc-devhelp-3.10.5-150400.4.7.1
python310-idle-3.10.5-150400.4.7.1
python310-testsuite-3.10.5-150400.4.7.1
python310-testsuite-debuginfo-3.10.5-150400.4.7.1
python310-tk-3.10.5-150400.4.7.1
python310-tk-debuginfo-3.10.5-150400.4.7.1
python310-tools-3.10.5-150400.4.7.1
- openSUSE Leap 15.4 (x86_64):
libpython3_10-1_0-32bit-3.10.5-150400.4.7.1
libpython3_10-1_0-32bit-debuginfo-3.10.5-150400.4.7.1
python310-32bit-3.10.5-150400.4.7.1
python310-32bit-debuginfo-3.10.5-150400.4.7.1
python310-base-32bit-3.10.5-150400.4.7.1
python310-base-32bit-debuginfo-3.10.5-150400.4.7.1
- SUSE Linux Enterprise Module for Python3 15-SP4 (aarch64 ppc64le s390x x86_64):
libpython3_10-1_0-3.10.5-150400.4.7.1
libpython3_10-1_0-debuginfo-3.10.5-150400.4.7.1
python310-3.10.5-150400.4.7.1
python310-base-3.10.5-150400.4.7.1
python310-base-debuginfo-3.10.5-150400.4.7.1
python310-core-debugsource-3.10.5-150400.4.7.1
python310-curses-3.10.5-150400.4.7.1
python310-curses-debuginfo-3.10.5-150400.4.7.1
python310-dbm-3.10.5-150400.4.7.1
python310-dbm-debuginfo-3.10.5-150400.4.7.1
python310-debuginfo-3.10.5-150400.4.7.1
python310-debugsource-3.10.5-150400.4.7.1
python310-devel-3.10.5-150400.4.7.1
python310-idle-3.10.5-150400.4.7.1
python310-tk-3.10.5-150400.4.7.1
python310-tk-debuginfo-3.10.5-150400.4.7.1
python310-tools-3.10.5-150400.4.7.1
References:
https://www.suse.com/security/cve/CVE-2015-20107.html
https://bugzilla.suse.com/1198511
1
0
SUSE-SU-2022:2303-1: important: Security update for php8
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for php8
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2303-1
Rating: important
References: #1193041 #1200628 #1200645
Cross-References: CVE-2021-21707 CVE-2022-31625 CVE-2022-31626
CVSS scores:
CVE-2021-21707 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2021-21707 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-31625 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31625 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-31626 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Web Scripting 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for php8 fixes the following issues:
- CVE-2021-21707: Fixed a special character that breaks path in xml
parsing. (bsc#1193041)
- CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension.
(bsc#1200645)
- CVE-2022-31626: Fixed buffer overflow via user-supplied password when
using pdo_mysql extension with mysqlnd driver. (bsc#1200628)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2303=1
- SUSE Linux Enterprise Module for Web Scripting 15-SP4:
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP4-2022-2303=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
apache2-mod_php8-8.0.10-150400.4.8.1
apache2-mod_php8-debuginfo-8.0.10-150400.4.8.1
apache2-mod_php8-debugsource-8.0.10-150400.4.8.1
php8-8.0.10-150400.4.8.1
php8-bcmath-8.0.10-150400.4.8.1
php8-bcmath-debuginfo-8.0.10-150400.4.8.1
php8-bz2-8.0.10-150400.4.8.1
php8-bz2-debuginfo-8.0.10-150400.4.8.1
php8-calendar-8.0.10-150400.4.8.1
php8-calendar-debuginfo-8.0.10-150400.4.8.1
php8-cli-8.0.10-150400.4.8.1
php8-cli-debuginfo-8.0.10-150400.4.8.1
php8-ctype-8.0.10-150400.4.8.1
php8-ctype-debuginfo-8.0.10-150400.4.8.1
php8-curl-8.0.10-150400.4.8.1
php8-curl-debuginfo-8.0.10-150400.4.8.1
php8-dba-8.0.10-150400.4.8.1
php8-dba-debuginfo-8.0.10-150400.4.8.1
php8-debuginfo-8.0.10-150400.4.8.1
php8-debugsource-8.0.10-150400.4.8.1
php8-devel-8.0.10-150400.4.8.1
php8-dom-8.0.10-150400.4.8.1
php8-dom-debuginfo-8.0.10-150400.4.8.1
php8-embed-8.0.10-150400.4.8.1
php8-embed-debuginfo-8.0.10-150400.4.8.1
php8-embed-debugsource-8.0.10-150400.4.8.1
php8-enchant-8.0.10-150400.4.8.1
php8-enchant-debuginfo-8.0.10-150400.4.8.1
php8-exif-8.0.10-150400.4.8.1
php8-exif-debuginfo-8.0.10-150400.4.8.1
php8-fastcgi-8.0.10-150400.4.8.1
php8-fastcgi-debuginfo-8.0.10-150400.4.8.1
php8-fastcgi-debugsource-8.0.10-150400.4.8.1
php8-fileinfo-8.0.10-150400.4.8.1
php8-fileinfo-debuginfo-8.0.10-150400.4.8.1
php8-fpm-8.0.10-150400.4.8.1
php8-fpm-debuginfo-8.0.10-150400.4.8.1
php8-fpm-debugsource-8.0.10-150400.4.8.1
php8-ftp-8.0.10-150400.4.8.1
php8-ftp-debuginfo-8.0.10-150400.4.8.1
php8-gd-8.0.10-150400.4.8.1
php8-gd-debuginfo-8.0.10-150400.4.8.1
php8-gettext-8.0.10-150400.4.8.1
php8-gettext-debuginfo-8.0.10-150400.4.8.1
php8-gmp-8.0.10-150400.4.8.1
php8-gmp-debuginfo-8.0.10-150400.4.8.1
php8-iconv-8.0.10-150400.4.8.1
php8-iconv-debuginfo-8.0.10-150400.4.8.1
php8-intl-8.0.10-150400.4.8.1
php8-intl-debuginfo-8.0.10-150400.4.8.1
php8-ldap-8.0.10-150400.4.8.1
php8-ldap-debuginfo-8.0.10-150400.4.8.1
php8-mbstring-8.0.10-150400.4.8.1
php8-mbstring-debuginfo-8.0.10-150400.4.8.1
php8-mysql-8.0.10-150400.4.8.1
php8-mysql-debuginfo-8.0.10-150400.4.8.1
php8-odbc-8.0.10-150400.4.8.1
php8-odbc-debuginfo-8.0.10-150400.4.8.1
php8-opcache-8.0.10-150400.4.8.1
php8-opcache-debuginfo-8.0.10-150400.4.8.1
php8-openssl-8.0.10-150400.4.8.1
php8-openssl-debuginfo-8.0.10-150400.4.8.1
php8-pcntl-8.0.10-150400.4.8.1
php8-pcntl-debuginfo-8.0.10-150400.4.8.1
php8-pdo-8.0.10-150400.4.8.1
php8-pdo-debuginfo-8.0.10-150400.4.8.1
php8-pgsql-8.0.10-150400.4.8.1
php8-pgsql-debuginfo-8.0.10-150400.4.8.1
php8-phar-8.0.10-150400.4.8.1
php8-phar-debuginfo-8.0.10-150400.4.8.1
php8-posix-8.0.10-150400.4.8.1
php8-posix-debuginfo-8.0.10-150400.4.8.1
php8-readline-8.0.10-150400.4.8.1
php8-readline-debuginfo-8.0.10-150400.4.8.1
php8-shmop-8.0.10-150400.4.8.1
php8-shmop-debuginfo-8.0.10-150400.4.8.1
php8-snmp-8.0.10-150400.4.8.1
php8-snmp-debuginfo-8.0.10-150400.4.8.1
php8-soap-8.0.10-150400.4.8.1
php8-soap-debuginfo-8.0.10-150400.4.8.1
php8-sockets-8.0.10-150400.4.8.1
php8-sockets-debuginfo-8.0.10-150400.4.8.1
php8-sodium-8.0.10-150400.4.8.1
php8-sodium-debuginfo-8.0.10-150400.4.8.1
php8-sqlite-8.0.10-150400.4.8.1
php8-sqlite-debuginfo-8.0.10-150400.4.8.1
php8-sysvmsg-8.0.10-150400.4.8.1
php8-sysvmsg-debuginfo-8.0.10-150400.4.8.1
php8-sysvsem-8.0.10-150400.4.8.1
php8-sysvsem-debuginfo-8.0.10-150400.4.8.1
php8-sysvshm-8.0.10-150400.4.8.1
php8-sysvshm-debuginfo-8.0.10-150400.4.8.1
php8-test-8.0.10-150400.4.8.1
php8-tidy-8.0.10-150400.4.8.1
php8-tidy-debuginfo-8.0.10-150400.4.8.1
php8-tokenizer-8.0.10-150400.4.8.1
php8-tokenizer-debuginfo-8.0.10-150400.4.8.1
php8-xmlreader-8.0.10-150400.4.8.1
php8-xmlreader-debuginfo-8.0.10-150400.4.8.1
php8-xmlwriter-8.0.10-150400.4.8.1
php8-xmlwriter-debuginfo-8.0.10-150400.4.8.1
php8-xsl-8.0.10-150400.4.8.1
php8-xsl-debuginfo-8.0.10-150400.4.8.1
php8-zip-8.0.10-150400.4.8.1
php8-zip-debuginfo-8.0.10-150400.4.8.1
php8-zlib-8.0.10-150400.4.8.1
php8-zlib-debuginfo-8.0.10-150400.4.8.1
- SUSE Linux Enterprise Module for Web Scripting 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-mod_php8-8.0.10-150400.4.8.1
apache2-mod_php8-debuginfo-8.0.10-150400.4.8.1
apache2-mod_php8-debugsource-8.0.10-150400.4.8.1
php8-8.0.10-150400.4.8.1
php8-bcmath-8.0.10-150400.4.8.1
php8-bcmath-debuginfo-8.0.10-150400.4.8.1
php8-bz2-8.0.10-150400.4.8.1
php8-bz2-debuginfo-8.0.10-150400.4.8.1
php8-calendar-8.0.10-150400.4.8.1
php8-calendar-debuginfo-8.0.10-150400.4.8.1
php8-cli-8.0.10-150400.4.8.1
php8-cli-debuginfo-8.0.10-150400.4.8.1
php8-ctype-8.0.10-150400.4.8.1
php8-ctype-debuginfo-8.0.10-150400.4.8.1
php8-curl-8.0.10-150400.4.8.1
php8-curl-debuginfo-8.0.10-150400.4.8.1
php8-dba-8.0.10-150400.4.8.1
php8-dba-debuginfo-8.0.10-150400.4.8.1
php8-debuginfo-8.0.10-150400.4.8.1
php8-debugsource-8.0.10-150400.4.8.1
php8-devel-8.0.10-150400.4.8.1
php8-dom-8.0.10-150400.4.8.1
php8-dom-debuginfo-8.0.10-150400.4.8.1
php8-embed-8.0.10-150400.4.8.1
php8-embed-debuginfo-8.0.10-150400.4.8.1
php8-embed-debugsource-8.0.10-150400.4.8.1
php8-enchant-8.0.10-150400.4.8.1
php8-enchant-debuginfo-8.0.10-150400.4.8.1
php8-exif-8.0.10-150400.4.8.1
php8-exif-debuginfo-8.0.10-150400.4.8.1
php8-fastcgi-8.0.10-150400.4.8.1
php8-fastcgi-debuginfo-8.0.10-150400.4.8.1
php8-fastcgi-debugsource-8.0.10-150400.4.8.1
php8-fileinfo-8.0.10-150400.4.8.1
php8-fileinfo-debuginfo-8.0.10-150400.4.8.1
php8-fpm-8.0.10-150400.4.8.1
php8-fpm-debuginfo-8.0.10-150400.4.8.1
php8-fpm-debugsource-8.0.10-150400.4.8.1
php8-ftp-8.0.10-150400.4.8.1
php8-ftp-debuginfo-8.0.10-150400.4.8.1
php8-gd-8.0.10-150400.4.8.1
php8-gd-debuginfo-8.0.10-150400.4.8.1
php8-gettext-8.0.10-150400.4.8.1
php8-gettext-debuginfo-8.0.10-150400.4.8.1
php8-gmp-8.0.10-150400.4.8.1
php8-gmp-debuginfo-8.0.10-150400.4.8.1
php8-iconv-8.0.10-150400.4.8.1
php8-iconv-debuginfo-8.0.10-150400.4.8.1
php8-intl-8.0.10-150400.4.8.1
php8-intl-debuginfo-8.0.10-150400.4.8.1
php8-ldap-8.0.10-150400.4.8.1
php8-ldap-debuginfo-8.0.10-150400.4.8.1
php8-mbstring-8.0.10-150400.4.8.1
php8-mbstring-debuginfo-8.0.10-150400.4.8.1
php8-mysql-8.0.10-150400.4.8.1
php8-mysql-debuginfo-8.0.10-150400.4.8.1
php8-odbc-8.0.10-150400.4.8.1
php8-odbc-debuginfo-8.0.10-150400.4.8.1
php8-opcache-8.0.10-150400.4.8.1
php8-opcache-debuginfo-8.0.10-150400.4.8.1
php8-openssl-8.0.10-150400.4.8.1
php8-openssl-debuginfo-8.0.10-150400.4.8.1
php8-pcntl-8.0.10-150400.4.8.1
php8-pcntl-debuginfo-8.0.10-150400.4.8.1
php8-pdo-8.0.10-150400.4.8.1
php8-pdo-debuginfo-8.0.10-150400.4.8.1
php8-pgsql-8.0.10-150400.4.8.1
php8-pgsql-debuginfo-8.0.10-150400.4.8.1
php8-phar-8.0.10-150400.4.8.1
php8-phar-debuginfo-8.0.10-150400.4.8.1
php8-posix-8.0.10-150400.4.8.1
php8-posix-debuginfo-8.0.10-150400.4.8.1
php8-readline-8.0.10-150400.4.8.1
php8-readline-debuginfo-8.0.10-150400.4.8.1
php8-shmop-8.0.10-150400.4.8.1
php8-shmop-debuginfo-8.0.10-150400.4.8.1
php8-snmp-8.0.10-150400.4.8.1
php8-snmp-debuginfo-8.0.10-150400.4.8.1
php8-soap-8.0.10-150400.4.8.1
php8-soap-debuginfo-8.0.10-150400.4.8.1
php8-sockets-8.0.10-150400.4.8.1
php8-sockets-debuginfo-8.0.10-150400.4.8.1
php8-sodium-8.0.10-150400.4.8.1
php8-sodium-debuginfo-8.0.10-150400.4.8.1
php8-sqlite-8.0.10-150400.4.8.1
php8-sqlite-debuginfo-8.0.10-150400.4.8.1
php8-sysvmsg-8.0.10-150400.4.8.1
php8-sysvmsg-debuginfo-8.0.10-150400.4.8.1
php8-sysvsem-8.0.10-150400.4.8.1
php8-sysvsem-debuginfo-8.0.10-150400.4.8.1
php8-sysvshm-8.0.10-150400.4.8.1
php8-sysvshm-debuginfo-8.0.10-150400.4.8.1
php8-test-8.0.10-150400.4.8.1
php8-tidy-8.0.10-150400.4.8.1
php8-tidy-debuginfo-8.0.10-150400.4.8.1
php8-tokenizer-8.0.10-150400.4.8.1
php8-tokenizer-debuginfo-8.0.10-150400.4.8.1
php8-xmlreader-8.0.10-150400.4.8.1
php8-xmlreader-debuginfo-8.0.10-150400.4.8.1
php8-xmlwriter-8.0.10-150400.4.8.1
php8-xmlwriter-debuginfo-8.0.10-150400.4.8.1
php8-xsl-8.0.10-150400.4.8.1
php8-xsl-debuginfo-8.0.10-150400.4.8.1
php8-zip-8.0.10-150400.4.8.1
php8-zip-debuginfo-8.0.10-150400.4.8.1
php8-zlib-8.0.10-150400.4.8.1
php8-zlib-debuginfo-8.0.10-150400.4.8.1
References:
https://www.suse.com/security/cve/CVE-2021-21707.html
https://www.suse.com/security/cve/CVE-2022-31625.html
https://www.suse.com/security/cve/CVE-2022-31626.html
https://bugzilla.suse.com/1193041
https://bugzilla.suse.com/1200628
https://bugzilla.suse.com/1200645
1
0
SUSE-SU-2022:2302-1: important: Security update for apache2
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for apache2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2302-1
Rating: important
References: #1198913 #1200338 #1200340 #1200341 #1200345
#1200348 #1200350 #1200352
Cross-References: CVE-2022-26377 CVE-2022-28614 CVE-2022-28615
CVE-2022-29404 CVE-2022-30522 CVE-2022-30556
CVE-2022-31813
CVSS scores:
CVE-2022-26377 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-26377 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2022-28614 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-28614 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-28615 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-28615 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-29404 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-29404 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30522 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30522 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30556 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-30556 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-31813 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31813 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves 7 vulnerabilities and has one errata
is now available.
Description:
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp
(bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match()
(bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody
(bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with
websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop
mechanism (bsc#1200348)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2302=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2302=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2302=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2302=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
apache2-2.4.51-150400.6.3.1
apache2-debuginfo-2.4.51-150400.6.3.1
apache2-debugsource-2.4.51-150400.6.3.1
apache2-devel-2.4.51-150400.6.3.1
apache2-event-2.4.51-150400.6.3.1
apache2-event-debuginfo-2.4.51-150400.6.3.1
apache2-example-pages-2.4.51-150400.6.3.1
apache2-prefork-2.4.51-150400.6.3.1
apache2-prefork-debuginfo-2.4.51-150400.6.3.1
apache2-utils-2.4.51-150400.6.3.1
apache2-utils-debuginfo-2.4.51-150400.6.3.1
apache2-worker-2.4.51-150400.6.3.1
apache2-worker-debuginfo-2.4.51-150400.6.3.1
- openSUSE Leap 15.4 (noarch):
apache2-doc-2.4.51-150400.6.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-debuginfo-2.4.51-150400.6.3.1
apache2-debugsource-2.4.51-150400.6.3.1
apache2-devel-2.4.51-150400.6.3.1
apache2-worker-2.4.51-150400.6.3.1
apache2-worker-debuginfo-2.4.51-150400.6.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):
apache2-doc-2.4.51-150400.6.3.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-debuginfo-2.4.51-150400.6.3.1
apache2-debugsource-2.4.51-150400.6.3.1
apache2-event-2.4.51-150400.6.3.1
apache2-event-debuginfo-2.4.51-150400.6.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-2.4.51-150400.6.3.1
apache2-debuginfo-2.4.51-150400.6.3.1
apache2-debugsource-2.4.51-150400.6.3.1
apache2-prefork-2.4.51-150400.6.3.1
apache2-prefork-debuginfo-2.4.51-150400.6.3.1
apache2-utils-2.4.51-150400.6.3.1
apache2-utils-debuginfo-2.4.51-150400.6.3.1
References:
https://www.suse.com/security/cve/CVE-2022-26377.html
https://www.suse.com/security/cve/CVE-2022-28614.html
https://www.suse.com/security/cve/CVE-2022-28615.html
https://www.suse.com/security/cve/CVE-2022-29404.html
https://www.suse.com/security/cve/CVE-2022-30522.html
https://www.suse.com/security/cve/CVE-2022-30556.html
https://www.suse.com/security/cve/CVE-2022-31813.html
https://bugzilla.suse.com/1198913
https://bugzilla.suse.com/1200338
https://bugzilla.suse.com/1200340
https://bugzilla.suse.com/1200341
https://bugzilla.suse.com/1200345
https://bugzilla.suse.com/1200348
https://bugzilla.suse.com/1200350
https://bugzilla.suse.com/1200352
1
0
SUSE-SU-2022:2310-1: important: Security update for s390-tools
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for s390-tools
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2310-1
Rating: important
References: #1198581
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of s390-tools fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues
(bsc#1198581)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2310=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2310=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2310=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2310=1
Package List:
- openSUSE Leap 15.3 (s390x):
libekmfweb1-2.15.1-150300.8.24.1
libekmfweb1-debuginfo-2.15.1-150300.8.24.1
libekmfweb1-devel-2.15.1-150300.8.24.1
osasnmpd-2.15.1-150300.8.24.1
osasnmpd-debuginfo-2.15.1-150300.8.24.1
s390-tools-2.15.1-150300.8.24.1
s390-tools-debuginfo-2.15.1-150300.8.24.1
s390-tools-debugsource-2.15.1-150300.8.24.1
s390-tools-hmcdrvfs-2.15.1-150300.8.24.1
s390-tools-hmcdrvfs-debuginfo-2.15.1-150300.8.24.1
s390-tools-zdsfs-2.15.1-150300.8.24.1
s390-tools-zdsfs-debuginfo-2.15.1-150300.8.24.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (s390x):
libekmfweb1-2.15.1-150300.8.24.1
libekmfweb1-debuginfo-2.15.1-150300.8.24.1
libekmfweb1-devel-2.15.1-150300.8.24.1
osasnmpd-2.15.1-150300.8.24.1
osasnmpd-debuginfo-2.15.1-150300.8.24.1
s390-tools-2.15.1-150300.8.24.1
s390-tools-debuginfo-2.15.1-150300.8.24.1
s390-tools-debugsource-2.15.1-150300.8.24.1
s390-tools-hmcdrvfs-2.15.1-150300.8.24.1
s390-tools-hmcdrvfs-debuginfo-2.15.1-150300.8.24.1
s390-tools-zdsfs-2.15.1-150300.8.24.1
s390-tools-zdsfs-debuginfo-2.15.1-150300.8.24.1
- SUSE Linux Enterprise Micro 5.2 (s390x):
libekmfweb1-2.15.1-150300.8.24.1
libekmfweb1-debuginfo-2.15.1-150300.8.24.1
s390-tools-2.15.1-150300.8.24.1
s390-tools-debuginfo-2.15.1-150300.8.24.1
s390-tools-debugsource-2.15.1-150300.8.24.1
- SUSE Linux Enterprise Micro 5.1 (s390x):
libekmfweb1-2.15.1-150300.8.24.1
libekmfweb1-debuginfo-2.15.1-150300.8.24.1
s390-tools-2.15.1-150300.8.24.1
s390-tools-debuginfo-2.15.1-150300.8.24.1
s390-tools-debugsource-2.15.1-150300.8.24.1
References:
https://bugzilla.suse.com/1198581
1
0
SUSE-SU-2022:2294-1: important: Security update for expat
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for expat
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2294-1
Rating: important
References: #1196025 #1196026 #1196168 #1196169 #1196171
#1196784
Cross-References: CVE-2022-25235 CVE-2022-25236 CVE-2022-25313
CVE-2022-25314 CVE-2022-25315
CVSS scores:
CVE-2022-25235 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-25235 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-25236 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-25236 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-25313 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-25313 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-25314 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-25314 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-25315 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-25315 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves 5 vulnerabilities and has one errata
is now available.
Description:
This update for expat fixes the following issues:
- CVE-2022-25236: Fixed possible namespace-separator characters insertion
into namespace URIs (bsc#1196025).
- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context
(bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled
recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2294=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2294=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
expat-2.4.4-150400.3.6.9
expat-debuginfo-2.4.4-150400.3.6.9
expat-debugsource-2.4.4-150400.3.6.9
libexpat-devel-2.4.4-150400.3.6.9
libexpat1-2.4.4-150400.3.6.9
libexpat1-debuginfo-2.4.4-150400.3.6.9
- openSUSE Leap 15.4 (x86_64):
expat-32bit-debuginfo-2.4.4-150400.3.6.9
libexpat-devel-32bit-2.4.4-150400.3.6.9
libexpat1-32bit-2.4.4-150400.3.6.9
libexpat1-32bit-debuginfo-2.4.4-150400.3.6.9
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
expat-2.4.4-150400.3.6.9
expat-debuginfo-2.4.4-150400.3.6.9
expat-debugsource-2.4.4-150400.3.6.9
libexpat-devel-2.4.4-150400.3.6.9
libexpat1-2.4.4-150400.3.6.9
libexpat1-debuginfo-2.4.4-150400.3.6.9
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
expat-32bit-debuginfo-2.4.4-150400.3.6.9
libexpat1-32bit-2.4.4-150400.3.6.9
libexpat1-32bit-debuginfo-2.4.4-150400.3.6.9
References:
https://www.suse.com/security/cve/CVE-2022-25235.html
https://www.suse.com/security/cve/CVE-2022-25236.html
https://www.suse.com/security/cve/CVE-2022-25313.html
https://www.suse.com/security/cve/CVE-2022-25314.html
https://www.suse.com/security/cve/CVE-2022-25315.html
https://bugzilla.suse.com/1196025
https://bugzilla.suse.com/1196026
https://bugzilla.suse.com/1196168
https://bugzilla.suse.com/1196169
https://bugzilla.suse.com/1196171
https://bugzilla.suse.com/1196784
1
0
SUSE-SU-2022:2301-1: moderate: Security update for ImageMagick
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2301-1
Rating: moderate
References: #1200387 #1200388 #1200389
Cross-References: CVE-2022-32545 CVE-2022-32546 CVE-2022-32547
CVSS scores:
CVE-2022-32545 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32545 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-32546 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32546 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-32547 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32547 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2022-32545: Fixed an outside the range of representable values of
type. (bsc#1200388)
- CVE-2022-32546: Fixed an outside the range of representable values of
type. (bsc#1200389)
- CVE-2022-32547: Fixed a load of misaligned address at
MagickCore/property.c. (bsc#1200387)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2301=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2301=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2301=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.1.0.9-150400.6.3.1
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.3.1
ImageMagick-config-7-upstream-7.1.0.9-150400.6.3.1
ImageMagick-debuginfo-7.1.0.9-150400.6.3.1
ImageMagick-debugsource-7.1.0.9-150400.6.3.1
ImageMagick-devel-7.1.0.9-150400.6.3.1
ImageMagick-extra-7.1.0.9-150400.6.3.1
ImageMagick-extra-debuginfo-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.3.1
libMagick++-devel-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.3.1
perl-PerlMagick-7.1.0.9-150400.6.3.1
perl-PerlMagick-debuginfo-7.1.0.9-150400.6.3.1
- openSUSE Leap 15.4 (x86_64):
ImageMagick-devel-32bit-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.3.1
libMagick++-devel-32bit-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.3.1
- openSUSE Leap 15.4 (noarch):
ImageMagick-doc-7.1.0.9-150400.6.3.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-7.1.0.9-150400.6.3.1
ImageMagick-debugsource-7.1.0.9-150400.6.3.1
perl-PerlMagick-7.1.0.9-150400.6.3.1
perl-PerlMagick-debuginfo-7.1.0.9-150400.6.3.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.1.0.9-150400.6.3.1
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.3.1
ImageMagick-config-7-upstream-7.1.0.9-150400.6.3.1
ImageMagick-debuginfo-7.1.0.9-150400.6.3.1
ImageMagick-debugsource-7.1.0.9-150400.6.3.1
ImageMagick-devel-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.3.1
libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.3.1
libMagick++-devel-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.3.1
libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.3.1
libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.3.1
References:
https://www.suse.com/security/cve/CVE-2022-32545.html
https://www.suse.com/security/cve/CVE-2022-32546.html
https://www.suse.com/security/cve/CVE-2022-32547.html
https://bugzilla.suse.com/1200387
https://bugzilla.suse.com/1200388
https://bugzilla.suse.com/1200389
1
0
SUSE-SU-2022:2308-1: important: Security update for openssl-1_1
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for openssl-1_1
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2308-1
Rating: important
References: #1185637 #1199166 #1200550 #1201099
Cross-References: CVE-2022-1292 CVE-2022-2068 CVE-2022-2097
CVSS scores:
CVE-2022-1292 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1292 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2068 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2068 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2097 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash.
(bsc#1200550)
- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode
(bsc#1201099).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2308=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2308=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1l-150400.7.7.1
libopenssl1_1-1.1.1l-150400.7.7.1
libopenssl1_1-debuginfo-1.1.1l-150400.7.7.1
libopenssl1_1-hmac-1.1.1l-150400.7.7.1
openssl-1_1-1.1.1l-150400.7.7.1
openssl-1_1-debuginfo-1.1.1l-150400.7.7.1
openssl-1_1-debugsource-1.1.1l-150400.7.7.1
- openSUSE Leap 15.4 (x86_64):
libopenssl-1_1-devel-32bit-1.1.1l-150400.7.7.1
libopenssl1_1-32bit-1.1.1l-150400.7.7.1
libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.7.1
libopenssl1_1-hmac-32bit-1.1.1l-150400.7.7.1
- openSUSE Leap 15.4 (noarch):
openssl-1_1-doc-1.1.1l-150400.7.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1l-150400.7.7.1
libopenssl1_1-1.1.1l-150400.7.7.1
libopenssl1_1-debuginfo-1.1.1l-150400.7.7.1
libopenssl1_1-hmac-1.1.1l-150400.7.7.1
openssl-1_1-1.1.1l-150400.7.7.1
openssl-1_1-debuginfo-1.1.1l-150400.7.7.1
openssl-1_1-debugsource-1.1.1l-150400.7.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libopenssl1_1-32bit-1.1.1l-150400.7.7.1
libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.7.1
libopenssl1_1-hmac-32bit-1.1.1l-150400.7.7.1
References:
https://www.suse.com/security/cve/CVE-2022-1292.html
https://www.suse.com/security/cve/CVE-2022-2068.html
https://www.suse.com/security/cve/CVE-2022-2097.html
https://bugzilla.suse.com/1185637
https://bugzilla.suse.com/1199166
https://bugzilla.suse.com/1200550
https://bugzilla.suse.com/1201099
1
0
SUSE-SU-2022:2292-1: important: Security update for php7
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for php7
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2292-1
Rating: important
References: #1193041 #1200628 #1200645
Cross-References: CVE-2021-21707 CVE-2022-31625 CVE-2022-31626
CVSS scores:
CVE-2021-21707 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2021-21707 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-31625 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31625 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-31626 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Legacy Software 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for php7 fixes the following issues:
- CVE-2021-21707: Fixed a special character breaks path in xml parsing.
(bsc#1193041)
- CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension.
(bsc#1200645)
- CVE-2022-31626: Fixed buffer overflow via user-supplied password when
using pdo_mysql extension with mysqlnd driver. (bsc#1200628)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2292=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2292=1
- SUSE Linux Enterprise Module for Legacy Software 15-SP4:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2022-2292=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
apache2-mod_php7-7.4.25-150400.4.8.1
apache2-mod_php7-debuginfo-7.4.25-150400.4.8.1
apache2-mod_php7-debugsource-7.4.25-150400.4.8.1
php7-7.4.25-150400.4.8.1
php7-bcmath-7.4.25-150400.4.8.1
php7-bcmath-debuginfo-7.4.25-150400.4.8.1
php7-bz2-7.4.25-150400.4.8.1
php7-bz2-debuginfo-7.4.25-150400.4.8.1
php7-calendar-7.4.25-150400.4.8.1
php7-calendar-debuginfo-7.4.25-150400.4.8.1
php7-cli-7.4.25-150400.4.8.1
php7-cli-debuginfo-7.4.25-150400.4.8.1
php7-ctype-7.4.25-150400.4.8.1
php7-ctype-debuginfo-7.4.25-150400.4.8.1
php7-curl-7.4.25-150400.4.8.1
php7-curl-debuginfo-7.4.25-150400.4.8.1
php7-dba-7.4.25-150400.4.8.1
php7-dba-debuginfo-7.4.25-150400.4.8.1
php7-debuginfo-7.4.25-150400.4.8.1
php7-debugsource-7.4.25-150400.4.8.1
php7-devel-7.4.25-150400.4.8.1
php7-dom-7.4.25-150400.4.8.1
php7-dom-debuginfo-7.4.25-150400.4.8.1
php7-embed-7.4.25-150400.4.8.1
php7-embed-debuginfo-7.4.25-150400.4.8.1
php7-embed-debugsource-7.4.25-150400.4.8.1
php7-enchant-7.4.25-150400.4.8.1
php7-enchant-debuginfo-7.4.25-150400.4.8.1
php7-exif-7.4.25-150400.4.8.1
php7-exif-debuginfo-7.4.25-150400.4.8.1
php7-fastcgi-7.4.25-150400.4.8.1
php7-fastcgi-debuginfo-7.4.25-150400.4.8.1
php7-fastcgi-debugsource-7.4.25-150400.4.8.1
php7-fileinfo-7.4.25-150400.4.8.1
php7-fileinfo-debuginfo-7.4.25-150400.4.8.1
php7-fpm-7.4.25-150400.4.8.1
php7-fpm-debuginfo-7.4.25-150400.4.8.1
php7-fpm-debugsource-7.4.25-150400.4.8.1
php7-ftp-7.4.25-150400.4.8.1
php7-ftp-debuginfo-7.4.25-150400.4.8.1
php7-gd-7.4.25-150400.4.8.1
php7-gd-debuginfo-7.4.25-150400.4.8.1
php7-gettext-7.4.25-150400.4.8.1
php7-gettext-debuginfo-7.4.25-150400.4.8.1
php7-gmp-7.4.25-150400.4.8.1
php7-gmp-debuginfo-7.4.25-150400.4.8.1
php7-iconv-7.4.25-150400.4.8.1
php7-iconv-debuginfo-7.4.25-150400.4.8.1
php7-intl-7.4.25-150400.4.8.1
php7-intl-debuginfo-7.4.25-150400.4.8.1
php7-json-7.4.25-150400.4.8.1
php7-json-debuginfo-7.4.25-150400.4.8.1
php7-ldap-7.4.25-150400.4.8.1
php7-ldap-debuginfo-7.4.25-150400.4.8.1
php7-mbstring-7.4.25-150400.4.8.1
php7-mbstring-debuginfo-7.4.25-150400.4.8.1
php7-mysql-7.4.25-150400.4.8.1
php7-mysql-debuginfo-7.4.25-150400.4.8.1
php7-odbc-7.4.25-150400.4.8.1
php7-odbc-debuginfo-7.4.25-150400.4.8.1
php7-opcache-7.4.25-150400.4.8.1
php7-opcache-debuginfo-7.4.25-150400.4.8.1
php7-openssl-7.4.25-150400.4.8.1
php7-openssl-debuginfo-7.4.25-150400.4.8.1
php7-pcntl-7.4.25-150400.4.8.1
php7-pcntl-debuginfo-7.4.25-150400.4.8.1
php7-pdo-7.4.25-150400.4.8.1
php7-pdo-debuginfo-7.4.25-150400.4.8.1
php7-pgsql-7.4.25-150400.4.8.1
php7-pgsql-debuginfo-7.4.25-150400.4.8.1
php7-phar-7.4.25-150400.4.8.1
php7-phar-debuginfo-7.4.25-150400.4.8.1
php7-posix-7.4.25-150400.4.8.1
php7-posix-debuginfo-7.4.25-150400.4.8.1
php7-readline-7.4.25-150400.4.8.1
php7-readline-debuginfo-7.4.25-150400.4.8.1
php7-shmop-7.4.25-150400.4.8.1
php7-shmop-debuginfo-7.4.25-150400.4.8.1
php7-snmp-7.4.25-150400.4.8.1
php7-snmp-debuginfo-7.4.25-150400.4.8.1
php7-soap-7.4.25-150400.4.8.1
php7-soap-debuginfo-7.4.25-150400.4.8.1
php7-sockets-7.4.25-150400.4.8.1
php7-sockets-debuginfo-7.4.25-150400.4.8.1
php7-sodium-7.4.25-150400.4.8.1
php7-sodium-debuginfo-7.4.25-150400.4.8.1
php7-sqlite-7.4.25-150400.4.8.1
php7-sqlite-debuginfo-7.4.25-150400.4.8.1
php7-sysvmsg-7.4.25-150400.4.8.1
php7-sysvmsg-debuginfo-7.4.25-150400.4.8.1
php7-sysvsem-7.4.25-150400.4.8.1
php7-sysvsem-debuginfo-7.4.25-150400.4.8.1
php7-sysvshm-7.4.25-150400.4.8.1
php7-sysvshm-debuginfo-7.4.25-150400.4.8.1
php7-test-7.4.25-150400.4.8.1
php7-tidy-7.4.25-150400.4.8.1
php7-tidy-debuginfo-7.4.25-150400.4.8.1
php7-tokenizer-7.4.25-150400.4.8.1
php7-tokenizer-debuginfo-7.4.25-150400.4.8.1
php7-xmlreader-7.4.25-150400.4.8.1
php7-xmlreader-debuginfo-7.4.25-150400.4.8.1
php7-xmlrpc-7.4.25-150400.4.8.1
php7-xmlrpc-debuginfo-7.4.25-150400.4.8.1
php7-xmlwriter-7.4.25-150400.4.8.1
php7-xmlwriter-debuginfo-7.4.25-150400.4.8.1
php7-xsl-7.4.25-150400.4.8.1
php7-xsl-debuginfo-7.4.25-150400.4.8.1
php7-zip-7.4.25-150400.4.8.1
php7-zip-debuginfo-7.4.25-150400.4.8.1
php7-zlib-7.4.25-150400.4.8.1
php7-zlib-debuginfo-7.4.25-150400.4.8.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (aarch64 ppc64le s390x x86_64):
php7-embed-7.4.25-150400.4.8.1
php7-embed-debuginfo-7.4.25-150400.4.8.1
php7-embed-debugsource-7.4.25-150400.4.8.1
- SUSE Linux Enterprise Module for Legacy Software 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-mod_php7-7.4.25-150400.4.8.1
apache2-mod_php7-debuginfo-7.4.25-150400.4.8.1
apache2-mod_php7-debugsource-7.4.25-150400.4.8.1
php7-7.4.25-150400.4.8.1
php7-bcmath-7.4.25-150400.4.8.1
php7-bcmath-debuginfo-7.4.25-150400.4.8.1
php7-bz2-7.4.25-150400.4.8.1
php7-bz2-debuginfo-7.4.25-150400.4.8.1
php7-calendar-7.4.25-150400.4.8.1
php7-calendar-debuginfo-7.4.25-150400.4.8.1
php7-cli-7.4.25-150400.4.8.1
php7-cli-debuginfo-7.4.25-150400.4.8.1
php7-ctype-7.4.25-150400.4.8.1
php7-ctype-debuginfo-7.4.25-150400.4.8.1
php7-curl-7.4.25-150400.4.8.1
php7-curl-debuginfo-7.4.25-150400.4.8.1
php7-dba-7.4.25-150400.4.8.1
php7-dba-debuginfo-7.4.25-150400.4.8.1
php7-debuginfo-7.4.25-150400.4.8.1
php7-debugsource-7.4.25-150400.4.8.1
php7-devel-7.4.25-150400.4.8.1
php7-dom-7.4.25-150400.4.8.1
php7-dom-debuginfo-7.4.25-150400.4.8.1
php7-enchant-7.4.25-150400.4.8.1
php7-enchant-debuginfo-7.4.25-150400.4.8.1
php7-exif-7.4.25-150400.4.8.1
php7-exif-debuginfo-7.4.25-150400.4.8.1
php7-fastcgi-7.4.25-150400.4.8.1
php7-fastcgi-debuginfo-7.4.25-150400.4.8.1
php7-fastcgi-debugsource-7.4.25-150400.4.8.1
php7-fileinfo-7.4.25-150400.4.8.1
php7-fileinfo-debuginfo-7.4.25-150400.4.8.1
php7-fpm-7.4.25-150400.4.8.1
php7-fpm-debuginfo-7.4.25-150400.4.8.1
php7-fpm-debugsource-7.4.25-150400.4.8.1
php7-ftp-7.4.25-150400.4.8.1
php7-ftp-debuginfo-7.4.25-150400.4.8.1
php7-gd-7.4.25-150400.4.8.1
php7-gd-debuginfo-7.4.25-150400.4.8.1
php7-gettext-7.4.25-150400.4.8.1
php7-gettext-debuginfo-7.4.25-150400.4.8.1
php7-gmp-7.4.25-150400.4.8.1
php7-gmp-debuginfo-7.4.25-150400.4.8.1
php7-iconv-7.4.25-150400.4.8.1
php7-iconv-debuginfo-7.4.25-150400.4.8.1
php7-intl-7.4.25-150400.4.8.1
php7-intl-debuginfo-7.4.25-150400.4.8.1
php7-json-7.4.25-150400.4.8.1
php7-json-debuginfo-7.4.25-150400.4.8.1
php7-ldap-7.4.25-150400.4.8.1
php7-ldap-debuginfo-7.4.25-150400.4.8.1
php7-mbstring-7.4.25-150400.4.8.1
php7-mbstring-debuginfo-7.4.25-150400.4.8.1
php7-mysql-7.4.25-150400.4.8.1
php7-mysql-debuginfo-7.4.25-150400.4.8.1
php7-odbc-7.4.25-150400.4.8.1
php7-odbc-debuginfo-7.4.25-150400.4.8.1
php7-opcache-7.4.25-150400.4.8.1
php7-opcache-debuginfo-7.4.25-150400.4.8.1
php7-openssl-7.4.25-150400.4.8.1
php7-openssl-debuginfo-7.4.25-150400.4.8.1
php7-pcntl-7.4.25-150400.4.8.1
php7-pcntl-debuginfo-7.4.25-150400.4.8.1
php7-pdo-7.4.25-150400.4.8.1
php7-pdo-debuginfo-7.4.25-150400.4.8.1
php7-pgsql-7.4.25-150400.4.8.1
php7-pgsql-debuginfo-7.4.25-150400.4.8.1
php7-phar-7.4.25-150400.4.8.1
php7-phar-debuginfo-7.4.25-150400.4.8.1
php7-posix-7.4.25-150400.4.8.1
php7-posix-debuginfo-7.4.25-150400.4.8.1
php7-readline-7.4.25-150400.4.8.1
php7-readline-debuginfo-7.4.25-150400.4.8.1
php7-shmop-7.4.25-150400.4.8.1
php7-shmop-debuginfo-7.4.25-150400.4.8.1
php7-snmp-7.4.25-150400.4.8.1
php7-snmp-debuginfo-7.4.25-150400.4.8.1
php7-soap-7.4.25-150400.4.8.1
php7-soap-debuginfo-7.4.25-150400.4.8.1
php7-sockets-7.4.25-150400.4.8.1
php7-sockets-debuginfo-7.4.25-150400.4.8.1
php7-sodium-7.4.25-150400.4.8.1
php7-sodium-debuginfo-7.4.25-150400.4.8.1
php7-sqlite-7.4.25-150400.4.8.1
php7-sqlite-debuginfo-7.4.25-150400.4.8.1
php7-sysvmsg-7.4.25-150400.4.8.1
php7-sysvmsg-debuginfo-7.4.25-150400.4.8.1
php7-sysvsem-7.4.25-150400.4.8.1
php7-sysvsem-debuginfo-7.4.25-150400.4.8.1
php7-sysvshm-7.4.25-150400.4.8.1
php7-sysvshm-debuginfo-7.4.25-150400.4.8.1
php7-tidy-7.4.25-150400.4.8.1
php7-tidy-debuginfo-7.4.25-150400.4.8.1
php7-tokenizer-7.4.25-150400.4.8.1
php7-tokenizer-debuginfo-7.4.25-150400.4.8.1
php7-xmlreader-7.4.25-150400.4.8.1
php7-xmlreader-debuginfo-7.4.25-150400.4.8.1
php7-xmlrpc-7.4.25-150400.4.8.1
php7-xmlrpc-debuginfo-7.4.25-150400.4.8.1
php7-xmlwriter-7.4.25-150400.4.8.1
php7-xmlwriter-debuginfo-7.4.25-150400.4.8.1
php7-xsl-7.4.25-150400.4.8.1
php7-xsl-debuginfo-7.4.25-150400.4.8.1
php7-zip-7.4.25-150400.4.8.1
php7-zip-debuginfo-7.4.25-150400.4.8.1
php7-zlib-7.4.25-150400.4.8.1
php7-zlib-debuginfo-7.4.25-150400.4.8.1
References:
https://www.suse.com/security/cve/CVE-2021-21707.html
https://www.suse.com/security/cve/CVE-2022-31625.html
https://www.suse.com/security/cve/CVE-2022-31626.html
https://bugzilla.suse.com/1193041
https://bugzilla.suse.com/1200628
https://bugzilla.suse.com/1200645
1
0
SUSE-SU-2022:2297-1: important: Security update for python-Twisted
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for python-Twisted
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2297-1
Rating: important
References: #1196739
Cross-References: CVE-2022-21716
CVSS scores:
CVE-2022-21716 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21716 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-Twisted fixes the following issues:
- CVE-2022-21716: Fixed that ssh server accepts an infinite amount of data
using all the available memory (bsc#1196739).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2297=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2297=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
python-Twisted-doc-22.2.0-150400.5.4.1
python3-Twisted-22.2.0-150400.5.4.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
python3-Twisted-22.2.0-150400.5.4.1
References:
https://www.suse.com/security/cve/CVE-2022-21716.html
https://bugzilla.suse.com/1196739
1
0
openSUSE-SU-2022:10042-1: important: Security update for librttopo
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
openSUSE Security Update: Security update for librttopo
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10042-1
Rating: important
References: #1201215
Cross-References: CVE-2017-18359
CVSS scores:
CVE-2017-18359 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for librttopo fixes the following issues:
- CVE-2017-18359: Fixed a denial of service in rtgeom_to_x3d3()
(boo#1201215)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10042=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 ppc64le s390x x86_64):
librttopo-devel-1.1.0-bp154.2.3.1
librttopo1-1.1.0-bp154.2.3.1
References:
https://www.suse.com/security/cve/CVE-2017-18359.html
https://bugzilla.suse.com/1201215
1
0
SUSE-SU-2022:2277-1: moderate: Security update for haproxy
by opensuse-security@opensuse.org 06 Jul '22
by opensuse-security@opensuse.org 06 Jul '22
06 Jul '22
SUSE Security Update: Security update for haproxy
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2277-1
Rating: moderate
References: #1196408
Cross-References: CVE-2022-0711
CVSS scores:
CVE-2022-0711 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-0711 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise High Availability 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for haproxy fixes the following issues:
- CVE-2022-0711: haproxy: Denial of service via set-cookie2 header
(bsc#1196408).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2277=1
- SUSE Linux Enterprise High Availability 15-SP4:
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2022-2277=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13
haproxy-debuginfo-2.4.8+git0.d1f8d41e0-150400.3.3.13
haproxy-debugsource-2.4.8+git0.d1f8d41e0-150400.3.3.13
- SUSE Linux Enterprise High Availability 15-SP4 (aarch64 ppc64le s390x x86_64):
haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13
haproxy-debuginfo-2.4.8+git0.d1f8d41e0-150400.3.3.13
haproxy-debugsource-2.4.8+git0.d1f8d41e0-150400.3.3.13
References:
https://www.suse.com/security/cve/CVE-2022-0711.html
https://bugzilla.suse.com/1196408
1
0
SUSE-SU-2022:2275-1: important: Security update for php7
by opensuse-security@opensuse.org 05 Jul '22
by opensuse-security@opensuse.org 05 Jul '22
05 Jul '22
SUSE Security Update: Security update for php7
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2275-1
Rating: important
References: #1200628 #1200645
Cross-References: CVE-2022-31625 CVE-2022-31626
CVSS scores:
CVE-2022-31625 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31625 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-31626 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for php7 fixes the following issues:
- CVE-2022-31625: Fixed uninitialized pointers free in Postgres extension.
(bsc#1200645)
- CVE-2022-31626: Fixed buffer overflow via user-supplied password when
using pdo_mysql extension with mysqlnd driver. (bsc#1200628).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2275=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2275=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-2275=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2275=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2275=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-2275=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2275=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2275=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2275=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2275=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2275=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
- SUSE Enterprise Storage 6 (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE CaaS Platform 4.0 (noarch):
php7-pear-7.2.5-150000.4.95.1
php7-pear-Archive_Tar-7.2.5-150000.4.95.1
- SUSE CaaS Platform 4.0 (x86_64):
apache2-mod_php7-7.2.5-150000.4.95.1
apache2-mod_php7-debuginfo-7.2.5-150000.4.95.1
php7-7.2.5-150000.4.95.1
php7-bcmath-7.2.5-150000.4.95.1
php7-bcmath-debuginfo-7.2.5-150000.4.95.1
php7-bz2-7.2.5-150000.4.95.1
php7-bz2-debuginfo-7.2.5-150000.4.95.1
php7-calendar-7.2.5-150000.4.95.1
php7-calendar-debuginfo-7.2.5-150000.4.95.1
php7-ctype-7.2.5-150000.4.95.1
php7-ctype-debuginfo-7.2.5-150000.4.95.1
php7-curl-7.2.5-150000.4.95.1
php7-curl-debuginfo-7.2.5-150000.4.95.1
php7-dba-7.2.5-150000.4.95.1
php7-dba-debuginfo-7.2.5-150000.4.95.1
php7-debuginfo-7.2.5-150000.4.95.1
php7-debugsource-7.2.5-150000.4.95.1
php7-devel-7.2.5-150000.4.95.1
php7-dom-7.2.5-150000.4.95.1
php7-dom-debuginfo-7.2.5-150000.4.95.1
php7-enchant-7.2.5-150000.4.95.1
php7-enchant-debuginfo-7.2.5-150000.4.95.1
php7-exif-7.2.5-150000.4.95.1
php7-exif-debuginfo-7.2.5-150000.4.95.1
php7-fastcgi-7.2.5-150000.4.95.1
php7-fastcgi-debuginfo-7.2.5-150000.4.95.1
php7-fileinfo-7.2.5-150000.4.95.1
php7-fileinfo-debuginfo-7.2.5-150000.4.95.1
php7-fpm-7.2.5-150000.4.95.1
php7-fpm-debuginfo-7.2.5-150000.4.95.1
php7-ftp-7.2.5-150000.4.95.1
php7-ftp-debuginfo-7.2.5-150000.4.95.1
php7-gd-7.2.5-150000.4.95.1
php7-gd-debuginfo-7.2.5-150000.4.95.1
php7-gettext-7.2.5-150000.4.95.1
php7-gettext-debuginfo-7.2.5-150000.4.95.1
php7-gmp-7.2.5-150000.4.95.1
php7-gmp-debuginfo-7.2.5-150000.4.95.1
php7-iconv-7.2.5-150000.4.95.1
php7-iconv-debuginfo-7.2.5-150000.4.95.1
php7-intl-7.2.5-150000.4.95.1
php7-intl-debuginfo-7.2.5-150000.4.95.1
php7-json-7.2.5-150000.4.95.1
php7-json-debuginfo-7.2.5-150000.4.95.1
php7-ldap-7.2.5-150000.4.95.1
php7-ldap-debuginfo-7.2.5-150000.4.95.1
php7-mbstring-7.2.5-150000.4.95.1
php7-mbstring-debuginfo-7.2.5-150000.4.95.1
php7-mysql-7.2.5-150000.4.95.1
php7-mysql-debuginfo-7.2.5-150000.4.95.1
php7-odbc-7.2.5-150000.4.95.1
php7-odbc-debuginfo-7.2.5-150000.4.95.1
php7-opcache-7.2.5-150000.4.95.1
php7-opcache-debuginfo-7.2.5-150000.4.95.1
php7-openssl-7.2.5-150000.4.95.1
php7-openssl-debuginfo-7.2.5-150000.4.95.1
php7-pcntl-7.2.5-150000.4.95.1
php7-pcntl-debuginfo-7.2.5-150000.4.95.1
php7-pdo-7.2.5-150000.4.95.1
php7-pdo-debuginfo-7.2.5-150000.4.95.1
php7-pgsql-7.2.5-150000.4.95.1
php7-pgsql-debuginfo-7.2.5-150000.4.95.1
php7-phar-7.2.5-150000.4.95.1
php7-phar-debuginfo-7.2.5-150000.4.95.1
php7-posix-7.2.5-150000.4.95.1
php7-posix-debuginfo-7.2.5-150000.4.95.1
php7-readline-7.2.5-150000.4.95.1
php7-readline-debuginfo-7.2.5-150000.4.95.1
php7-shmop-7.2.5-150000.4.95.1
php7-shmop-debuginfo-7.2.5-150000.4.95.1
php7-snmp-7.2.5-150000.4.95.1
php7-snmp-debuginfo-7.2.5-150000.4.95.1
php7-soap-7.2.5-150000.4.95.1
php7-soap-debuginfo-7.2.5-150000.4.95.1
php7-sockets-7.2.5-150000.4.95.1
php7-sockets-debuginfo-7.2.5-150000.4.95.1
php7-sodium-7.2.5-150000.4.95.1
php7-sodium-debuginfo-7.2.5-150000.4.95.1
php7-sqlite-7.2.5-150000.4.95.1
php7-sqlite-debuginfo-7.2.5-150000.4.95.1
php7-sysvmsg-7.2.5-150000.4.95.1
php7-sysvmsg-debuginfo-7.2.5-150000.4.95.1
php7-sysvsem-7.2.5-150000.4.95.1
php7-sysvsem-debuginfo-7.2.5-150000.4.95.1
php7-sysvshm-7.2.5-150000.4.95.1
php7-sysvshm-debuginfo-7.2.5-150000.4.95.1
php7-tidy-7.2.5-150000.4.95.1
php7-tidy-debuginfo-7.2.5-150000.4.95.1
php7-tokenizer-7.2.5-150000.4.95.1
php7-tokenizer-debuginfo-7.2.5-150000.4.95.1
php7-wddx-7.2.5-150000.4.95.1
php7-wddx-debuginfo-7.2.5-150000.4.95.1
php7-xmlreader-7.2.5-150000.4.95.1
php7-xmlreader-debuginfo-7.2.5-150000.4.95.1
php7-xmlrpc-7.2.5-150000.4.95.1
php7-xmlrpc-debuginfo-7.2.5-150000.4.95.1
php7-xmlwriter-7.2.5-150000.4.95.1
php7-xmlwriter-debuginfo-7.2.5-150000.4.95.1
php7-xsl-7.2.5-150000.4.95.1
php7-xsl-debuginfo-7.2.5-150000.4.95.1
php7-zip-7.2.5-150000.4.95.1
php7-zip-debuginfo-7.2.5-150000.4.95.1
php7-zlib-7.2.5-150000.4.95.1
php7-zlib-debuginfo-7.2.5-150000.4.95.1
References:
https://www.suse.com/security/cve/CVE-2022-31625.html
https://www.suse.com/security/cve/CVE-2022-31626.html
https://bugzilla.suse.com/1200628
https://bugzilla.suse.com/1200645
1
0
SUSE-SU-2022:2272-1: important: Security update for dpdk
by opensuse-security@opensuse.org 05 Jul '22
by opensuse-security@opensuse.org 05 Jul '22
05 Jul '22
SUSE Security Update: Security update for dpdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2272-1
Rating: important
References: #1198581
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server for SAP 15-SP1
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of dpdk fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues
(bsc#1198581)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2272=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2272=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2272=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2272=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2272=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2272=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2272=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2272=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le x86_64):
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
- SUSE CaaS Platform 4.0 (x86_64):
dpdk-18.11.9-150100.4.16.1
dpdk-debuginfo-18.11.9-150100.4.16.1
dpdk-debugsource-18.11.9-150100.4.16.1
dpdk-devel-18.11.9-150100.4.16.1
dpdk-devel-debuginfo-18.11.9-150100.4.16.1
dpdk-kmp-default-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_150100.197.114-150100.4.16.1
dpdk-tools-18.11.9-150100.4.16.1
dpdk-tools-debuginfo-18.11.9-150100.4.16.1
libdpdk-18_11-18.11.9-150100.4.16.1
libdpdk-18_11-debuginfo-18.11.9-150100.4.16.1
References:
https://bugzilla.suse.com/1198581
1
0
SUSE-SU-2022:2267-1: important: Security update for dpdk
by opensuse-security@opensuse.org 05 Jul '22
by opensuse-security@opensuse.org 05 Jul '22
05 Jul '22
SUSE Security Update: Security update for dpdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2267-1
Rating: important
References: #1198581
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of dpdk fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues
(bsc#1198581)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2267=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-2267=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
dpdk-19.11.4-150300.13.3
dpdk-debuginfo-19.11.4-150300.13.3
dpdk-debugsource-19.11.4-150300.13.3
dpdk-devel-19.11.4-150300.13.3
dpdk-devel-debuginfo-19.11.4-150300.13.3
dpdk-examples-19.11.4-150300.13.3
dpdk-examples-debuginfo-19.11.4-150300.13.3
dpdk-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-tools-19.11.4-150300.13.3
dpdk-tools-debuginfo-19.11.4-150300.13.3
libdpdk-20_0-19.11.4-150300.13.3
libdpdk-20_0-debuginfo-19.11.4-150300.13.3
- openSUSE Leap 15.3 (aarch64 x86_64):
dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
- openSUSE Leap 15.3 (aarch64):
dpdk-thunderx-19.11.4-150300.13.3
dpdk-thunderx-debuginfo-19.11.4-150300.13.3
dpdk-thunderx-debugsource-19.11.4-150300.13.3
dpdk-thunderx-devel-19.11.4-150300.13.3
dpdk-thunderx-devel-debuginfo-19.11.4-150300.13.3
dpdk-thunderx-examples-19.11.4-150300.13.3
dpdk-thunderx-examples-debuginfo-19.11.4-150300.13.3
dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-thunderx-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-thunderx-tools-19.11.4-150300.13.3
dpdk-thunderx-tools-debuginfo-19.11.4-150300.13.3
- openSUSE Leap 15.3 (noarch):
dpdk-doc-19.11.4-150300.13.3
dpdk-thunderx-doc-19.11.4-150300.13.3
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le x86_64):
dpdk-19.11.4-150300.13.3
dpdk-debuginfo-19.11.4-150300.13.3
dpdk-debugsource-19.11.4-150300.13.3
dpdk-devel-19.11.4-150300.13.3
dpdk-devel-debuginfo-19.11.4-150300.13.3
dpdk-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-tools-19.11.4-150300.13.3
dpdk-tools-debuginfo-19.11.4-150300.13.3
libdpdk-20_0-19.11.4-150300.13.3
libdpdk-20_0-debuginfo-19.11.4-150300.13.3
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64):
dpdk-thunderx-19.11.4-150300.13.3
dpdk-thunderx-debuginfo-19.11.4-150300.13.3
dpdk-thunderx-debugsource-19.11.4-150300.13.3
dpdk-thunderx-devel-19.11.4-150300.13.3
dpdk-thunderx-devel-debuginfo-19.11.4-150300.13.3
dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.76-150300.13.3
dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.76-150300.13.3
References:
https://bugzilla.suse.com/1198581
1
0
SUSE-SU-2022:2260-1: important: Security update for qemu
by opensuse-security@opensuse.org 04 Jul '22
by opensuse-security@opensuse.org 04 Jul '22
04 Jul '22
SUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2260-1
Rating: important
References: #1197084 #1198035 #1198037 #1198711 #1198712
#1199015 #1199018 #1199625 #1199924
Cross-References: CVE-2021-4206 CVE-2021-4207 CVE-2022-26353
CVE-2022-26354
CVSS scores:
CVE-2021-4206 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4206 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (NVD) : 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-26353 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-26353 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-26354 (NVD) : 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
CVE-2022-26354 (SUSE): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves four vulnerabilities and has 5 fixes
is now available.
Description:
This update for qemu fixes the following issues:
- CVE-2022-26354: Fixed missing virtqueue detach on error can lead to
memory leak (bsc#1198712)
- CVE-2022-26353: Fixed map leaking on error during receive (bsc#1198711)
- CVE-2021-4207: Fixed double fetch in qxl_cursor() can lead to heap
buffer overflow (bsc#1198037)
- CVE-2021-4206: Fixed integer overflow in cursor_alloc() can lead to heap
buffer overflow (bsc#1198035)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2260=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2260=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2260=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
qemu-6.2.0-150400.37.5.3
qemu-accel-qtest-6.2.0-150400.37.5.3
qemu-accel-qtest-debuginfo-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.5.3
qemu-arm-6.2.0-150400.37.5.3
qemu-arm-debuginfo-6.2.0-150400.37.5.3
qemu-audio-alsa-6.2.0-150400.37.5.3
qemu-audio-alsa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-jack-6.2.0-150400.37.5.3
qemu-audio-jack-debuginfo-6.2.0-150400.37.5.3
qemu-audio-oss-debuginfo-6.2.0-150400.37.5.3
qemu-audio-pa-6.2.0-150400.37.5.3
qemu-audio-pa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-spice-6.2.0-150400.37.5.3
qemu-audio-spice-debuginfo-6.2.0-150400.37.5.3
qemu-block-curl-6.2.0-150400.37.5.3
qemu-block-curl-debuginfo-6.2.0-150400.37.5.3
qemu-block-dmg-6.2.0-150400.37.5.3
qemu-block-dmg-debuginfo-6.2.0-150400.37.5.3
qemu-block-gluster-6.2.0-150400.37.5.3
qemu-block-gluster-debuginfo-6.2.0-150400.37.5.3
qemu-block-iscsi-6.2.0-150400.37.5.3
qemu-block-iscsi-debuginfo-6.2.0-150400.37.5.3
qemu-block-nfs-6.2.0-150400.37.5.3
qemu-block-nfs-debuginfo-6.2.0-150400.37.5.3
qemu-block-rbd-6.2.0-150400.37.5.3
qemu-block-rbd-debuginfo-6.2.0-150400.37.5.3
qemu-block-ssh-6.2.0-150400.37.5.3
qemu-block-ssh-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-baum-6.2.0-150400.37.5.3
qemu-chardev-baum-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-spice-6.2.0-150400.37.5.3
qemu-chardev-spice-debuginfo-6.2.0-150400.37.5.3
qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-extra-6.2.0-150400.37.5.3
qemu-extra-debuginfo-6.2.0-150400.37.5.3
qemu-guest-agent-6.2.0-150400.37.5.3
qemu-guest-agent-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-qxl-6.2.0-150400.37.5.3
qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.5.3
qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.5.3
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-host-6.2.0-150400.37.5.3
qemu-hw-usb-host-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-smartcard-6.2.0-150400.37.5.3
qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.5.3
qemu-ivshmem-tools-6.2.0-150400.37.5.3
qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.5.3
qemu-ksm-6.2.0-150400.37.5.3
qemu-lang-6.2.0-150400.37.5.3
qemu-linux-user-6.2.0-150400.37.5.1
qemu-linux-user-debuginfo-6.2.0-150400.37.5.1
qemu-linux-user-debugsource-6.2.0-150400.37.5.1
qemu-ppc-6.2.0-150400.37.5.3
qemu-ppc-debuginfo-6.2.0-150400.37.5.3
qemu-s390x-6.2.0-150400.37.5.3
qemu-s390x-debuginfo-6.2.0-150400.37.5.3
qemu-testsuite-6.2.0-150400.37.5.5
qemu-tools-6.2.0-150400.37.5.3
qemu-tools-debuginfo-6.2.0-150400.37.5.3
qemu-ui-curses-6.2.0-150400.37.5.3
qemu-ui-curses-debuginfo-6.2.0-150400.37.5.3
qemu-ui-gtk-6.2.0-150400.37.5.3
qemu-ui-gtk-debuginfo-6.2.0-150400.37.5.3
qemu-ui-opengl-6.2.0-150400.37.5.3
qemu-ui-opengl-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-app-6.2.0-150400.37.5.3
qemu-ui-spice-app-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-core-6.2.0-150400.37.5.3
qemu-ui-spice-core-debuginfo-6.2.0-150400.37.5.3
qemu-vhost-user-gpu-6.2.0-150400.37.5.3
qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.5.3
qemu-x86-6.2.0-150400.37.5.3
qemu-x86-debuginfo-6.2.0-150400.37.5.3
- openSUSE Leap 15.4 (s390x x86_64):
qemu-kvm-6.2.0-150400.37.5.3
- openSUSE Leap 15.4 (noarch):
qemu-SLOF-6.2.0-150400.37.5.3
qemu-ipxe-1.0.0+-150400.37.5.3
qemu-microvm-6.2.0-150400.37.5.3
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.5.3
qemu-sgabios-8-150400.37.5.3
qemu-skiboot-6.2.0-150400.37.5.3
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
qemu-6.2.0-150400.37.5.3
qemu-block-curl-6.2.0-150400.37.5.3
qemu-block-curl-debuginfo-6.2.0-150400.37.5.3
qemu-block-iscsi-6.2.0-150400.37.5.3
qemu-block-iscsi-debuginfo-6.2.0-150400.37.5.3
qemu-block-rbd-6.2.0-150400.37.5.3
qemu-block-rbd-debuginfo-6.2.0-150400.37.5.3
qemu-block-ssh-6.2.0-150400.37.5.3
qemu-block-ssh-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-baum-6.2.0-150400.37.5.3
qemu-chardev-baum-debuginfo-6.2.0-150400.37.5.3
qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-guest-agent-6.2.0-150400.37.5.3
qemu-guest-agent-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-host-6.2.0-150400.37.5.3
qemu-hw-usb-host-debuginfo-6.2.0-150400.37.5.3
qemu-ksm-6.2.0-150400.37.5.3
qemu-lang-6.2.0-150400.37.5.3
qemu-ui-curses-6.2.0-150400.37.5.3
qemu-ui-curses-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le x86_64):
qemu-audio-spice-6.2.0-150400.37.5.3
qemu-audio-spice-debuginfo-6.2.0-150400.37.5.3
qemu-chardev-spice-6.2.0-150400.37.5.3
qemu-chardev-spice-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-qxl-6.2.0-150400.37.5.3
qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-6.2.0-150400.37.5.3
qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-6.2.0-150400.37.5.3
qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.5.3
qemu-ui-gtk-6.2.0-150400.37.5.3
qemu-ui-gtk-debuginfo-6.2.0-150400.37.5.3
qemu-ui-opengl-6.2.0-150400.37.5.3
qemu-ui-opengl-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-app-6.2.0-150400.37.5.3
qemu-ui-spice-app-debuginfo-6.2.0-150400.37.5.3
qemu-ui-spice-core-6.2.0-150400.37.5.3
qemu-ui-spice-core-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (s390x x86_64):
qemu-hw-display-virtio-gpu-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.5.3
qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.5.3
qemu-kvm-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64):
qemu-arm-6.2.0-150400.37.5.3
qemu-arm-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (ppc64le):
qemu-ppc-6.2.0-150400.37.5.3
qemu-ppc-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (x86_64):
qemu-accel-tcg-x86-6.2.0-150400.37.5.3
qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.5.3
qemu-audio-alsa-6.2.0-150400.37.5.3
qemu-audio-alsa-debuginfo-6.2.0-150400.37.5.3
qemu-audio-pa-6.2.0-150400.37.5.3
qemu-audio-pa-debuginfo-6.2.0-150400.37.5.3
qemu-x86-6.2.0-150400.37.5.3
qemu-x86-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):
qemu-SLOF-6.2.0-150400.37.5.3
qemu-ipxe-1.0.0+-150400.37.5.3
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.5.3
qemu-sgabios-8-150400.37.5.3
qemu-skiboot-6.2.0-150400.37.5.3
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.5.3
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (s390x):
qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.5.3
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.5.3
qemu-s390x-6.2.0-150400.37.5.3
qemu-s390x-debuginfo-6.2.0-150400.37.5.3
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
qemu-debuginfo-6.2.0-150400.37.5.3
qemu-debugsource-6.2.0-150400.37.5.3
qemu-tools-6.2.0-150400.37.5.3
qemu-tools-debuginfo-6.2.0-150400.37.5.3
References:
https://www.suse.com/security/cve/CVE-2021-4206.html
https://www.suse.com/security/cve/CVE-2021-4207.html
https://www.suse.com/security/cve/CVE-2022-26353.html
https://www.suse.com/security/cve/CVE-2022-26354.html
https://bugzilla.suse.com/1197084
https://bugzilla.suse.com/1198035
https://bugzilla.suse.com/1198037
https://bugzilla.suse.com/1198711
https://bugzilla.suse.com/1198712
https://bugzilla.suse.com/1199015
https://bugzilla.suse.com/1199018
https://bugzilla.suse.com/1199625
https://bugzilla.suse.com/1199924
1
0
SUSE-SU-2022:2259-1: moderate: Security update for ImageMagick
by opensuse-security@opensuse.org 04 Jul '22
by opensuse-security@opensuse.org 04 Jul '22
04 Jul '22
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2259-1
Rating: moderate
References: #1153866 #1200387 #1200388 #1200389
Cross-References: CVE-2019-17540 CVE-2022-32545 CVE-2022-32546
CVE-2022-32547
CVSS scores:
CVE-2019-17540 (SUSE): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVE-2022-32545 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32545 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-32546 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32546 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-32547 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-32547 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2019-17540: Fixed heap-based buffer overflow in ReadPSInfo in
coders/ps.c. (bsc#1153866)
- CVE-2022-32545: Fixed an outside the range of representable values of
type. (bsc#1200388)
- CVE-2022-32546: Fixed an outside the range of representable values of
type. (bsc#1200389)
- CVE-2022-32547: Fixed a load of misaligned address at
MagickCore/property.c. (bsc#1200387)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2259=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2259=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2259=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2259=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
- openSUSE Leap 15.4 (x86_64):
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.31.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-150200.10.31.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.31.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.31.1
ImageMagick-debuginfo-7.0.7.34-150200.10.31.1
ImageMagick-debugsource-7.0.7.34-150200.10.31.1
ImageMagick-devel-7.0.7.34-150200.10.31.1
ImageMagick-extra-7.0.7.34-150200.10.31.1
ImageMagick-extra-debuginfo-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.31.1
libMagick++-devel-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
perl-PerlMagick-7.0.7.34-150200.10.31.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.31.1
- openSUSE Leap 15.3 (x86_64):
ImageMagick-devel-32bit-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-150200.10.31.1
libMagick++-devel-32bit-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.31.1
- openSUSE Leap 15.3 (noarch):
ImageMagick-doc-7.0.7.34-150200.10.31.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-7.0.7.34-150200.10.31.1
ImageMagick-debugsource-7.0.7.34-150200.10.31.1
perl-PerlMagick-7.0.7.34-150200.10.31.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.31.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-150200.10.31.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.31.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.31.1
ImageMagick-debuginfo-7.0.7.34-150200.10.31.1
ImageMagick-debugsource-7.0.7.34-150200.10.31.1
ImageMagick-devel-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.31.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.31.1
libMagick++-devel-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.31.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.31.1
References:
https://www.suse.com/security/cve/CVE-2019-17540.html
https://www.suse.com/security/cve/CVE-2022-32545.html
https://www.suse.com/security/cve/CVE-2022-32546.html
https://www.suse.com/security/cve/CVE-2022-32547.html
https://bugzilla.suse.com/1153866
https://bugzilla.suse.com/1200387
https://bugzilla.suse.com/1200388
https://bugzilla.suse.com/1200389
1
0
SUSE-SU-2022:2254-1: important: Security update for qemu
by opensuse-security@opensuse.org 04 Jul '22
by opensuse-security@opensuse.org 04 Jul '22
04 Jul '22
SUSE Security Update: Security update for qemu
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2254-1
Rating: important
References: #1197084 #1198035 #1198037 #1198712 #1199018
#1199924
Cross-References: CVE-2021-4206 CVE-2021-4207 CVE-2022-26354
CVSS scores:
CVE-2021-4206 (NVD) : 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4206 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (NVD) : 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2021-4207 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-26354 (NVD) : 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
CVE-2022-26354 (SUSE): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves three vulnerabilities and has three
fixes is now available.
Description:
This update for qemu fixes the following issues:
- CVE-2022-26354: Fixed missing virtqueue detach on error can lead to
memory leak (bsc#1198712)
- CVE-2021-4207: Fixed double fetch in qxl_cursor() can lead to heap
buffer overflow (bsc#1198037)
- CVE-2021-4206: Fixed integer overflow in cursor_alloc() can lead to heap
buffer overflow (bsc#1198035)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2254=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-2254=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2254=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2254=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2254=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
qemu-5.2.0-150300.115.2
qemu-arm-5.2.0-150300.115.2
qemu-arm-debuginfo-5.2.0-150300.115.2
qemu-audio-alsa-5.2.0-150300.115.2
qemu-audio-alsa-debuginfo-5.2.0-150300.115.2
qemu-audio-pa-5.2.0-150300.115.2
qemu-audio-pa-debuginfo-5.2.0-150300.115.2
qemu-audio-spice-5.2.0-150300.115.2
qemu-audio-spice-debuginfo-5.2.0-150300.115.2
qemu-block-curl-5.2.0-150300.115.2
qemu-block-curl-debuginfo-5.2.0-150300.115.2
qemu-block-dmg-5.2.0-150300.115.2
qemu-block-dmg-debuginfo-5.2.0-150300.115.2
qemu-block-gluster-5.2.0-150300.115.2
qemu-block-gluster-debuginfo-5.2.0-150300.115.2
qemu-block-iscsi-5.2.0-150300.115.2
qemu-block-iscsi-debuginfo-5.2.0-150300.115.2
qemu-block-nfs-5.2.0-150300.115.2
qemu-block-nfs-debuginfo-5.2.0-150300.115.2
qemu-block-rbd-5.2.0-150300.115.2
qemu-block-rbd-debuginfo-5.2.0-150300.115.2
qemu-block-ssh-5.2.0-150300.115.2
qemu-block-ssh-debuginfo-5.2.0-150300.115.2
qemu-chardev-baum-5.2.0-150300.115.2
qemu-chardev-baum-debuginfo-5.2.0-150300.115.2
qemu-chardev-spice-5.2.0-150300.115.2
qemu-chardev-spice-debuginfo-5.2.0-150300.115.2
qemu-debuginfo-5.2.0-150300.115.2
qemu-debugsource-5.2.0-150300.115.2
qemu-extra-5.2.0-150300.115.2
qemu-extra-debuginfo-5.2.0-150300.115.2
qemu-guest-agent-5.2.0-150300.115.2
qemu-guest-agent-debuginfo-5.2.0-150300.115.2
qemu-hw-display-qxl-5.2.0-150300.115.2
qemu-hw-display-qxl-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-pci-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-pci-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.115.2
qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.115.2
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-5.2.0-150300.115.2
qemu-hw-usb-redirect-5.2.0-150300.115.2
qemu-hw-usb-redirect-debuginfo-5.2.0-150300.115.2
qemu-hw-usb-smartcard-5.2.0-150300.115.2
qemu-hw-usb-smartcard-debuginfo-5.2.0-150300.115.2
qemu-ivshmem-tools-5.2.0-150300.115.2
qemu-ivshmem-tools-debuginfo-5.2.0-150300.115.2
qemu-ksm-5.2.0-150300.115.2
qemu-lang-5.2.0-150300.115.2
qemu-linux-user-5.2.0-150300.115.2
qemu-linux-user-debuginfo-5.2.0-150300.115.2
qemu-linux-user-debugsource-5.2.0-150300.115.2
qemu-ppc-5.2.0-150300.115.2
qemu-ppc-debuginfo-5.2.0-150300.115.2
qemu-s390x-5.2.0-150300.115.2
qemu-s390x-debuginfo-5.2.0-150300.115.2
qemu-testsuite-5.2.0-150300.115.4
qemu-tools-5.2.0-150300.115.2
qemu-tools-debuginfo-5.2.0-150300.115.2
qemu-ui-curses-5.2.0-150300.115.2
qemu-ui-curses-debuginfo-5.2.0-150300.115.2
qemu-ui-gtk-5.2.0-150300.115.2
qemu-ui-gtk-debuginfo-5.2.0-150300.115.2
qemu-ui-opengl-5.2.0-150300.115.2
qemu-ui-opengl-debuginfo-5.2.0-150300.115.2
qemu-ui-spice-app-5.2.0-150300.115.2
qemu-ui-spice-app-debuginfo-5.2.0-150300.115.2
qemu-ui-spice-core-5.2.0-150300.115.2
qemu-ui-spice-core-debuginfo-5.2.0-150300.115.2
qemu-vhost-user-gpu-5.2.0-150300.115.2
qemu-vhost-user-gpu-debuginfo-5.2.0-150300.115.2
qemu-x86-5.2.0-150300.115.2
qemu-x86-debuginfo-5.2.0-150300.115.2
- openSUSE Leap 15.3 (s390x x86_64):
qemu-kvm-5.2.0-150300.115.2
- openSUSE Leap 15.3 (noarch):
qemu-SLOF-5.2.0-150300.115.2
qemu-ipxe-1.0.0+-150300.115.2
qemu-microvm-5.2.0-150300.115.2
qemu-seabios-1.14.0_0_g155821a-150300.115.2
qemu-sgabios-8-150300.115.2
qemu-skiboot-5.2.0-150300.115.2
qemu-vgabios-1.14.0_0_g155821a-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
qemu-5.2.0-150300.115.2
qemu-block-curl-5.2.0-150300.115.2
qemu-block-curl-debuginfo-5.2.0-150300.115.2
qemu-block-iscsi-5.2.0-150300.115.2
qemu-block-iscsi-debuginfo-5.2.0-150300.115.2
qemu-block-rbd-5.2.0-150300.115.2
qemu-block-rbd-debuginfo-5.2.0-150300.115.2
qemu-block-ssh-5.2.0-150300.115.2
qemu-block-ssh-debuginfo-5.2.0-150300.115.2
qemu-chardev-baum-5.2.0-150300.115.2
qemu-chardev-baum-debuginfo-5.2.0-150300.115.2
qemu-debuginfo-5.2.0-150300.115.2
qemu-debugsource-5.2.0-150300.115.2
qemu-guest-agent-5.2.0-150300.115.2
qemu-guest-agent-debuginfo-5.2.0-150300.115.2
qemu-ksm-5.2.0-150300.115.2
qemu-lang-5.2.0-150300.115.2
qemu-ui-curses-5.2.0-150300.115.2
qemu-ui-curses-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le x86_64):
qemu-audio-spice-5.2.0-150300.115.2
qemu-audio-spice-debuginfo-5.2.0-150300.115.2
qemu-chardev-spice-5.2.0-150300.115.2
qemu-chardev-spice-debuginfo-5.2.0-150300.115.2
qemu-hw-display-qxl-5.2.0-150300.115.2
qemu-hw-display-qxl-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.115.2
qemu-hw-usb-redirect-5.2.0-150300.115.2
qemu-hw-usb-redirect-debuginfo-5.2.0-150300.115.2
qemu-ui-gtk-5.2.0-150300.115.2
qemu-ui-gtk-debuginfo-5.2.0-150300.115.2
qemu-ui-opengl-5.2.0-150300.115.2
qemu-ui-opengl-debuginfo-5.2.0-150300.115.2
qemu-ui-spice-app-5.2.0-150300.115.2
qemu-ui-spice-app-debuginfo-5.2.0-150300.115.2
qemu-ui-spice-core-5.2.0-150300.115.2
qemu-ui-spice-core-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (s390x x86_64):
qemu-hw-display-virtio-gpu-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-pci-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-pci-debuginfo-5.2.0-150300.115.2
qemu-kvm-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64):
qemu-arm-5.2.0-150300.115.2
qemu-arm-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (ppc64le):
qemu-ppc-5.2.0-150300.115.2
qemu-ppc-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (x86_64):
qemu-audio-alsa-5.2.0-150300.115.2
qemu-audio-alsa-debuginfo-5.2.0-150300.115.2
qemu-audio-pa-5.2.0-150300.115.2
qemu-audio-pa-debuginfo-5.2.0-150300.115.2
qemu-x86-5.2.0-150300.115.2
qemu-x86-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
qemu-SLOF-5.2.0-150300.115.2
qemu-ipxe-1.0.0+-150300.115.2
qemu-seabios-1.14.0_0_g155821a-150300.115.2
qemu-sgabios-8-150300.115.2
qemu-skiboot-5.2.0-150300.115.2
qemu-vgabios-1.14.0_0_g155821a-150300.115.2
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (s390x):
qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.115.2
qemu-hw-s390x-virtio-gpu-ccw-debuginfo-5.2.0-150300.115.2
qemu-s390x-5.2.0-150300.115.2
qemu-s390x-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
qemu-debuginfo-5.2.0-150300.115.2
qemu-debugsource-5.2.0-150300.115.2
qemu-tools-5.2.0-150300.115.2
qemu-tools-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
qemu-5.2.0-150300.115.2
qemu-audio-spice-5.2.0-150300.115.2
qemu-audio-spice-debuginfo-5.2.0-150300.115.2
qemu-chardev-spice-5.2.0-150300.115.2
qemu-chardev-spice-debuginfo-5.2.0-150300.115.2
qemu-debuginfo-5.2.0-150300.115.2
qemu-debugsource-5.2.0-150300.115.2
qemu-guest-agent-5.2.0-150300.115.2
qemu-guest-agent-debuginfo-5.2.0-150300.115.2
qemu-hw-display-qxl-5.2.0-150300.115.2
qemu-hw-display-qxl-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-5.2.0-150300.115.2
qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-5.2.0-150300.115.2
qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.115.2
qemu-hw-usb-redirect-5.2.0-150300.115.2
qemu-hw-usb-redirect-debuginfo-5.2.0-150300.115.2
qemu-tools-5.2.0-150300.115.2
qemu-tools-debuginfo-5.2.0-150300.115.2
qemu-ui-opengl-5.2.0-150300.115.2
qemu-ui-opengl-debuginfo-5.2.0-150300.115.2
qemu-ui-spice-core-5.2.0-150300.115.2
qemu-ui-spice-core-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.2 (aarch64):
qemu-arm-5.2.0-150300.115.2
qemu-arm-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.2 (noarch):
qemu-ipxe-1.0.0+-150300.115.2
qemu-seabios-1.14.0_0_g155821a-150300.115.2
qemu-sgabios-8-150300.115.2
qemu-vgabios-1.14.0_0_g155821a-150300.115.2
- SUSE Linux Enterprise Micro 5.2 (x86_64):
qemu-x86-5.2.0-150300.115.2
qemu-x86-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.2 (s390x):
qemu-s390x-5.2.0-150300.115.2
qemu-s390x-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
qemu-5.2.0-150300.115.2
qemu-debuginfo-5.2.0-150300.115.2
qemu-debugsource-5.2.0-150300.115.2
qemu-tools-5.2.0-150300.115.2
qemu-tools-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.1 (aarch64):
qemu-arm-5.2.0-150300.115.2
qemu-arm-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.1 (x86_64):
qemu-x86-5.2.0-150300.115.2
qemu-x86-debuginfo-5.2.0-150300.115.2
- SUSE Linux Enterprise Micro 5.1 (noarch):
qemu-ipxe-1.0.0+-150300.115.2
qemu-seabios-1.14.0_0_g155821a-150300.115.2
qemu-sgabios-8-150300.115.2
qemu-vgabios-1.14.0_0_g155821a-150300.115.2
- SUSE Linux Enterprise Micro 5.1 (s390x):
qemu-s390x-5.2.0-150300.115.2
qemu-s390x-debuginfo-5.2.0-150300.115.2
References:
https://www.suse.com/security/cve/CVE-2021-4206.html
https://www.suse.com/security/cve/CVE-2021-4207.html
https://www.suse.com/security/cve/CVE-2022-26354.html
https://bugzilla.suse.com/1197084
https://bugzilla.suse.com/1198035
https://bugzilla.suse.com/1198037
https://bugzilla.suse.com/1198712
https://bugzilla.suse.com/1199018
https://bugzilla.suse.com/1199924
1
0
SUSE-SU-2022:2251-1: moderate: Security update for openssl-1_1
by opensuse-security@opensuse.org 04 Jul '22
by opensuse-security@opensuse.org 04 Jul '22
04 Jul '22
SUSE Security Update: Security update for openssl-1_1
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2251-1
Rating: moderate
References: #1185637 #1199166 #1200550
Cross-References: CVE-2022-1292 CVE-2022-2068
CVSS scores:
CVE-2022-1292 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1292 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2068 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2068 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash.
(bsc#1200550)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2251=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2251=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2251=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2251=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2251=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2251=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2251=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2251=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2251=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2251=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2251=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2251=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2251=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- openSUSE Leap 15.3 (noarch):
openssl-1_1-doc-1.1.1d-150200.11.48.1
- openSUSE Leap 15.3 (x86_64):
libopenssl-1_1-devel-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Manager Server 4.1 (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Manager Proxy 4.1 (x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libopenssl-1_1-devel-1.1.1d-150200.11.48.1
libopenssl1_1-1.1.1d-150200.11.48.1
libopenssl1_1-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-1.1.1d-150200.11.48.1
openssl-1_1-1.1.1d-150200.11.48.1
openssl-1_1-debuginfo-1.1.1d-150200.11.48.1
openssl-1_1-debugsource-1.1.1d-150200.11.48.1
- SUSE Enterprise Storage 7 (x86_64):
libopenssl1_1-32bit-1.1.1d-150200.11.48.1
libopenssl1_1-32bit-debuginfo-1.1.1d-150200.11.48.1
libopenssl1_1-hmac-32bit-1.1.1d-150200.11.48.1
References:
https://www.suse.com/security/cve/CVE-2022-1292.html
https://www.suse.com/security/cve/CVE-2022-2068.html
https://bugzilla.suse.com/1185637
https://bugzilla.suse.com/1199166
https://bugzilla.suse.com/1200550
1
0
SUSE-SU-2022:2252-1: important: Security update for liblouis
by opensuse-security@opensuse.org 04 Jul '22
by opensuse-security@opensuse.org 04 Jul '22
04 Jul '22
SUSE Security Update: Security update for liblouis
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2252-1
Rating: important
References: #1130813 #1197085 #1200120
Cross-References: CVE-2022-26981 CVE-2022-31783
CVSS scores:
CVE-2022-26981 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-26981 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CVE-2022-31783 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-31783 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for liblouis fixes the following issues:
- CVE-2022-26981: fix buffer overrun in compilePassOpcode (bsc#1197085).
- CVE-2022-31783: prevent an invalid memory write in compileRule
(bsc#1200120).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2252=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2252=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2252=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-2252=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2252=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2252=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-2252=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2252=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2252=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2252=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2252=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2252=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
- SUSE CaaS Platform 4.0 (x86_64):
liblouis-data-3.3.0-150000.4.8.1
liblouis-debuginfo-3.3.0-150000.4.8.1
liblouis-debugsource-3.3.0-150000.4.8.1
liblouis-devel-3.3.0-150000.4.8.1
liblouis14-3.3.0-150000.4.8.1
liblouis14-debuginfo-3.3.0-150000.4.8.1
python3-louis-3.3.0-150000.4.8.1
References:
https://www.suse.com/security/cve/CVE-2022-26981.html
https://www.suse.com/security/cve/CVE-2022-31783.html
https://bugzilla.suse.com/1130813
https://bugzilla.suse.com/1197085
https://bugzilla.suse.com/1200120
1
0
openSUSE-SU-2022:10040-1: moderate: Security update for python-nltk
by opensuse-security@opensuse.org 03 Jul '22
by opensuse-security@opensuse.org 03 Jul '22
03 Jul '22
openSUSE Security Update: Security update for python-nltk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10040-1
Rating: moderate
References: #1146427 #1191030
Cross-References: CVE-2019-14751 CVE-2021-3828
CVSS scores:
CVE-2019-14751 (NVD) : 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2021-3828 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for python-nltk fixes the following issues:
Update to 3.7
- Improve and update the NLTK team page on nltk.org (#2855, #2941)
- Drop support for Python 3.6, support Python 3.10 (#2920)
- Update to 3.6.7
- Resolve IndexError in `sent_tokenize` and `word_tokenize` (#2922)
- Update to 3.6.6
- Refactor `gensim.doctest` to work for gensim 4.0.0 and up (#2914)
- Add Precision, Recall, F-measure, Confusion Matrix to Taggers (#2862)
- Added warnings if .zip files exist without any corresponding .csv
files. (#2908)
- Fix `FileNotFoundError` when the `download_dir` is a non-existing
nested folder (#2910)
- Rename omw to omw-1.4 (#2907)
- Resolve ReDoS opportunity by fixing incorrectly specified regex
(#2906, boo#1191030, CVE-2021-3828).
- Support OMW 1.4 (#2899)
- Deprecate Tree get and set node methods (#2900)
- Fix broken inaugural test case (#2903)
- Use Multilingual Wordnet Data from OMW with newer Wordnet versions
(#2889)
- Keep NLTKs "tokenize" module working with pathlib (#2896)
- Make prettyprinter to be more readable (#2893)
- Update links to the nltk book (#2895)
- Add `CITATION.cff` to nltk (#2880)
- Resolve serious ReDoS in PunktSentenceTokenizer (#2869)
- Delete old CI config files (#2881)
- Improve Tokenize documentation + add TokenizerI as superclass for
TweetTokenizer (#2878)
- Fix expected value for BLEU score doctest after changes from #2572
- Add multi Bleu functionality and tests (#2793)
- Deprecate 'return_str' parameter in NLTKWordTokenizer and
TreebankWordTokenizer (#2883)
- Allow empty string in CFG's + more (#2888)
- Partition `tree.py` module into `tree` package + pickle fix (#2863)
- Fix several TreebankWordTokenizer and NLTKWordTokenizer bugs (#2877)
- Rewind Wordnet data file after each lookup (#2868)
- Correct __init__ call for SyntaxCorpusReader subclasses (#2872)
- Documentation fixes (#2873)
- Fix levenstein distance for duplicated letters (#2849)
- Support alternative Wordnet versions (#2860)
- Remove hundreds of formatting warnings for nltk.org (#2859)
- Modernize `nltk.org/howto` pages (#2856)
- Fix Bleu Score smoothing function from taking log(0) (#2839)
- Update third party tools to newer versions and removing MaltParser
fixed version (#2832)
- Fix TypeError: _pretty() takes 1 positional argument but 2 were given
in sem/drt.py (#2854)
- Replace `http` with `https` in most URLs (#2852)
- Update to 3.6.5
- modernised nltk.org website
- addressed LGTM.com issues
- support ZWJ sequences emoji and skin tone modifer emoji in
TweetTokenizer
- METEOR evaluation now requires pre-tokenized input
- Code linting and type hinting
- implement get_refs function for DrtLambdaExpression
- Enable automated CoreNLP, Senna, Prover9/Mace4, Megam, MaltParser CI
tests
- specify minimum regex version that supports regex.Pattern
- avoid re.Pattern and regex.Pattern which fail for Python 3.6, 3.7
- Update to 3.6.4
- deprecate `nltk.usage(obj)` in favor of `help(obj)`
- resolve ReDoS vulnerability in Corpus Reader
- solidify performance tests
- improve phone number recognition in tweet tokenizer
- refactored CISTEM stemmer for German
- identify NLTK Team as the author
- replace travis badge with github actions badge
- add SECURITY.md
- Update to 3.6.3
- Dropped support for Python 3.5
- Run CI tests on Windows, too
- Moved from Travis CI to GitHub Actions
- Code and comment cleanups
- Visualize WordNet relation graphs using Graphviz
- Fixed large error in METEOR score
- Apply isort, pyupgrade, black, added as pre-commit hooks
- Prevent debug_decisions in Punkt from throwing IndexError
- Resolved ZeroDivisionError in RIBES with dissimilar sentences
- Initialize WordNet IC total counts with smoothing value
- Fixed AttributeError for Arabic ARLSTem2 stemmer
- Many fixes and improvements to lm language model package
- Fix bug in nltk.metrics.aline, C_skip = -10
- Improvements to TweetTokenizer
- Optional show arg for FreqDist.plot, ConditionalFreqDist.plot
- edit_distance now computes Damerau-Levenshtein edit-distance
- Update to 3.6.2
- move test code to nltk/test
- fix bug in NgramAssocMeasures (order preserving fix)
- Update to 3.6
- add support for Python 3.9
- add Tree.fromlist
- compute Minimum Spanning Tree of unweighted graph using BFS
- fix bug with infinite loop in Wordnet closure and tree
- fix bug in calculating BLEU using smoothing method 4
- Wordnet synset similarities work for all pos
- new Arabic light stemmer (ARLSTem2)
- new syllable tokenizer (LegalitySyllableTokenizer)
- remove nose in favor of pytest
- Update to v3.5
* add support for Python 3.8
* drop support for Python 2
* create NLTK's own Tokenizer class distinct from the Treebank reference
tokeniser
* update Vader sentiment analyser
* fix JSON serialization of some PoS taggers
* minor improvements in grammar.CFG, Vader, pl196x corpus reader,
StringTokenizer
* change implementation <= and >= for FreqDist so they are partial
orders
* make FreqDist iterable
* correctly handle Penn Treebank trees with a unlabeled branching top
node
- Update to 3.4.5 (boo#1146427, CVE-2019-14751):
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2022-10040=1
Package List:
- openSUSE Backports SLE-15-SP2 (noarch):
python3-nltk-3.7-bp152.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-14751.html
https://www.suse.com/security/cve/CVE-2021-3828.html
https://bugzilla.suse.com/1146427
https://bugzilla.suse.com/1191030
1
0