openSUSE Security Announce
Threads by month
- ----- 2024 -----
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
February 2023
- 1 participants
- 67 discussions
openSUSE-SU-2023:0062-1: moderate: Security update for python-Django
by opensuse-security@opensuse.org 28 Feb '23
by opensuse-security@opensuse.org 28 Feb '23
28 Feb '23
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0062-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
python-Django was updated to fix a security issues:
- CVE-2023-24580: prevent DOS in file uploads (bsc#1208082)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-62=1
Package List:
- openSUSE Backports SLE-15-SP4 (noarch):
python3-Django-2.2.28-bp154.2.9.1
References:
1
0
openSUSE-SU-2023:0061-1: important: Security update for chromium
by opensuse-security@opensuse.org 27 Feb '23
by opensuse-security@opensuse.org 27 Feb '23
27 Feb '23
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0061-1
Rating: important
References: #1208589
Cross-References: CVE-2023-0927 CVE-2023-0928 CVE-2023-0929
CVE-2023-0930 CVE-2023-0931 CVE-2023-0932
CVE-2023-0933 CVE-2023-0941
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 110.0.5481.177 (boo#1208589)
* CVE-2023-0927: Use after free in Web Payments API
* CVE-2023-0928: Use after free in SwiftShader
* CVE-2023-0929: Use after free in Vulkan
* CVE-2023-0930: Heap buffer overflow in Video
* CVE-2023-0931: Use after free in Video
* CVE-2023-0932: Use after free in WebRTC
* CVE-2023-0933: Integer overflow in PDF
* CVE-2023-0941: Use after free in Prompts
* Various fixes from internal audits, fuzzing and other initiatives
Chromium 110.0.5481.100
* fix regression on SAP Business Objects web UI
* fix date formatting behavior change from ICU 72
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-61=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):
chromedriver-110.0.5481.177-bp154.2.70.1
chromium-110.0.5481.177-bp154.2.70.1
References:
https://www.suse.com/security/cve/CVE-2023-0927.html
https://www.suse.com/security/cve/CVE-2023-0928.html
https://www.suse.com/security/cve/CVE-2023-0929.html
https://www.suse.com/security/cve/CVE-2023-0930.html
https://www.suse.com/security/cve/CVE-2023-0931.html
https://www.suse.com/security/cve/CVE-2023-0932.html
https://www.suse.com/security/cve/CVE-2023-0933.html
https://www.suse.com/security/cve/CVE-2023-0941.html
https://bugzilla.suse.com/1208589
1
0
openSUSE-SU-2023:0058-1: moderate: Security update for phpMyAdmin
by opensuse-security@opensuse.org 22 Feb '23
by opensuse-security@opensuse.org 22 Feb '23
22 Feb '23
openSUSE Security Update: Security update for phpMyAdmin
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0058-1
Rating: moderate
References: #1208186
Cross-References: CVE-2023-25727
Affected Products:
SUSE Linux Enterprise High Performance Computing 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12-SP3
SUSE Linux Enterprise Server for SAP Applications 12-SP4
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for phpMyAdmin fixes the following issues:
Update to 4.9.11:
* Fix an XSS attack through the drag-and-drop upload feature
(PMASA-2023-01, CWE-661, boo#1208186, CVE-2023-25727)
* Fix broken pagination links in the navigation sidebar
* Fix syntax error for PHP 5
* Fix hide_connection_errors being undefined when a controluser is set
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2023-58=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):
phpMyAdmin-4.9.11-58.1
References:
https://www.suse.com/security/cve/CVE-2023-25727.html
https://bugzilla.suse.com/1208186
1
0
openSUSE-SU-2023:0057-1: moderate: Security update for python-Django
by opensuse-security@opensuse.org 21 Feb '23
by opensuse-security@opensuse.org 21 Feb '23
21 Feb '23
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0057-1
Rating: moderate
References: #1203793 #1207565
Cross-References: CVE-2022-41323 CVE-2023-23969
CVSS scores:
CVE-2022-41323 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-23969 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-23969 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for python-Django fixes the following issues:
- CVE-2023-23969: Fixed potential denial-of-service via Accept-Language
headers (boo#1207565)
- CVE-2022-41323: Fixed potential denial-of-service vulnerability in
internationalized URLs (boo#1203793)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-57=1
Package List:
- openSUSE Backports SLE-15-SP4 (noarch):
python3-Django-2.2.28-bp154.2.6.1
References:
https://www.suse.com/security/cve/CVE-2022-41323.html
https://www.suse.com/security/cve/CVE-2023-23969.html
https://bugzilla.suse.com/1203793
https://bugzilla.suse.com/1207565
1
0
SUSE-SU-2023:0465-1: important: Security update for prometheus-ha_cluster_exporter
by opensuse-security@opensuse.org 20 Feb '23
by opensuse-security@opensuse.org 20 Feb '23
20 Feb '23
SUSE Security Update: Security update for prometheus-ha_cluster_exporter
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0465-1
Rating: important
References: #1208046 #1208047
Cross-References: CVE-2022-46146
CVSS scores:
CVE-2022-46146 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-46146 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Module for SAP Applications 15-SP2
SUSE Linux Enterprise Module for SAP Applications 15-SP3
SUSE Linux Enterprise Module for SAP Applications 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for prometheus-ha_cluster_exporter fixes the following issues:
Updated to version 1.3.1:
- CVE-2022-46146: Fixed authentication bypass via cache poisoning in
prometheus/exporter-toolkit (bsc#1208046, bsc#1208047).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-465=1
- SUSE Linux Enterprise Module for SAP Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2023-465=1
- SUSE Linux Enterprise Module for SAP Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2023-465=1
- SUSE Linux Enterprise Module for SAP Applications 15-SP2:
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2023-465=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-150200.3.21.1
- SUSE Linux Enterprise Module for SAP Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-150200.3.21.1
- SUSE Linux Enterprise Module for SAP Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-150200.3.21.1
- SUSE Linux Enterprise Module for SAP Applications 15-SP2 (aarch64 ppc64le s390x x86_64):
prometheus-ha_cluster_exporter-1.3.1+git.1676027782.ad3c0e9-150200.3.21.1
References:
https://www.suse.com/security/cve/CVE-2022-46146.html
https://bugzilla.suse.com/1208046
https://bugzilla.suse.com/1208047
1
0
openSUSE-SU-2023:0054-1: moderate: Security update for jhead
by opensuse-security@opensuse.org 20 Feb '23
by opensuse-security@opensuse.org 20 Feb '23
20 Feb '23
openSUSE Security Update: Security update for jhead
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0054-1
Rating: moderate
References: #1207150
Cross-References: CVE-2022-41751
CVSS scores:
CVE-2022-41751 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for jhead fixes the following issues:
- Fixed autorotation problem caused by CVE-2022-41751 patch. [boo#1207150]
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-54=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64):
jhead-3.06.0.1-bp154.2.9.1
References:
https://www.suse.com/security/cve/CVE-2022-41751.html
https://bugzilla.suse.com/1207150
1
0
20 Feb '23
SUSE Security Update: Security update for tar
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0463-1
Rating: moderate
References: #1202436 #1207753
Cross-References: CVE-2022-48303
CVSS scores:
CVE-2022-48303 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-48303 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for tar fixes the following issues:
- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use
of uninitialized memory for a conditional jump (bsc#1207753).
Bug fixes:
- Fix hang when unpacking test tarball (bsc#1202436).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-463=1
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2023-463=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-463=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-463=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-463=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2023-463=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-463=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-463=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
tar-rmt-1.34-150000.3.31.1
tar-rmt-debuginfo-1.34-150000.3.31.1
tar-tests-1.34-150000.3.31.1
tar-tests-debuginfo-1.34-150000.3.31.1
- openSUSE Leap 15.4 (noarch):
tar-backup-scripts-1.34-150000.3.31.1
tar-doc-1.34-150000.3.31.1
tar-lang-1.34-150000.3.31.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (noarch):
tar-lang-1.34-150000.3.31.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
tar-rmt-1.34-150000.3.31.1
tar-rmt-debuginfo-1.34-150000.3.31.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
tar-rmt-1.34-150000.3.31.1
tar-rmt-debuginfo-1.34-150000.3.31.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
tar-lang-1.34-150000.3.31.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
tar-1.34-150000.3.31.1
tar-debuginfo-1.34-150000.3.31.1
tar-debugsource-1.34-150000.3.31.1
References:
https://www.suse.com/security/cve/CVE-2022-48303.html
https://bugzilla.suse.com/1202436
https://bugzilla.suse.com/1207753
1
0
SUSE-SU-2023:0461-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 20 Feb '23
by opensuse-security@opensuse.org 20 Feb '23
20 Feb '23
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0461-1
Rating: important
References: #1208138 #1208144
Cross-References: CVE-2023-0767 CVE-2023-25728 CVE-2023-25729
CVE-2023-25730 CVE-2023-25732 CVE-2023-25734
CVE-2023-25735 CVE-2023-25737 CVE-2023-25738
CVE-2023-25739 CVE-2023-25742 CVE-2023-25743
CVE-2023-25744 CVE-2023-25746
CVSS scores:
CVE-2023-0767 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for MozillaFirefox fixes the following issues:
Updated to version 102.8.0 ESR (bsc#1208144):
- CVE-2023-25728: Fixed content security policy leak in violation
reports using iframes.
- CVE-2023-25730: Fixed screen hijack via browser fullscreen mode.
- CVE-2023-25743: Fixed Fullscreen notification not being shown in
Firefox Focus.
- CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS.
- CVE-2023-25735: Fixed potential use-after-free from compartment
mismatch in SpiderMonkey.
- CVE-2023-25737: Fixed invalid downcast in
SVGUtils::SetupStrokeGeometry.
- CVE-2023-25738: Fixed printing on Windows which could potentially
crash Firefox with some device drivers.
- CVE-2023-25739: Fixed use-after-free in
mozilla::dom::ScriptLoadContext::~ScriptLoadContext.
- CVE-2023-25729: Fixed extensions opening external schemes without user
knowledge.
- CVE-2023-25732: Fixed out of bounds memory write from
EncodeInputStream.
- CVE-2023-25734: Fixed opening local .url files that causes unexpected
network loads.
- CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey.
- CVE-2023-25744: Fixed Memory safety bugs.
- CVE-2023-25746: Fixed Memory safety bugs.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-461=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-461=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-461=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-461=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-461=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-461=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-461=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-461=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-461=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-461=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-461=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2023-461=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-branding-upstream-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le x86_64):
MozillaFirefox-devel-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le x86_64):
MozillaFirefox-devel-102.8.0-150200.152.78.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-debuginfo-102.8.0-150200.152.78.1
MozillaFirefox-debugsource-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
References:
https://www.suse.com/security/cve/CVE-2023-0767.html
https://www.suse.com/security/cve/CVE-2023-25728.html
https://www.suse.com/security/cve/CVE-2023-25729.html
https://www.suse.com/security/cve/CVE-2023-25730.html
https://www.suse.com/security/cve/CVE-2023-25732.html
https://www.suse.com/security/cve/CVE-2023-25734.html
https://www.suse.com/security/cve/CVE-2023-25735.html
https://www.suse.com/security/cve/CVE-2023-25737.html
https://www.suse.com/security/cve/CVE-2023-25738.html
https://www.suse.com/security/cve/CVE-2023-25739.html
https://www.suse.com/security/cve/CVE-2023-25742.html
https://www.suse.com/security/cve/CVE-2023-25743.html
https://www.suse.com/security/cve/CVE-2023-25744.html
https://www.suse.com/security/cve/CVE-2023-25746.html
https://bugzilla.suse.com/1208138
https://bugzilla.suse.com/1208144
1
0
SUSE-SU-2023:0450-1: important: Security update for postgresql12
by opensuse-security@opensuse.org 20 Feb '23
by opensuse-security@opensuse.org 20 Feb '23
20 Feb '23
SUSE Security Update: Security update for postgresql12
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0450-1
Rating: important
References: #1208102
Cross-References: CVE-2022-41862
CVSS scores:
CVE-2022-41862 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP 15-SP3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for postgresql12 fixes the following issues:
Update to 12.14:
- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-450=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-450=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-450=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-450=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-450=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-450=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-450=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-450=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-450=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2023-450=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-llvmjit-12.14-150200.8.41.1
postgresql12-llvmjit-debuginfo-12.14-150200.8.41.1
postgresql12-llvmjit-devel-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
postgresql12-test-12.14-150200.8.41.1
- openSUSE Leap 15.4 (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Enterprise Storage 7.1 (noarch):
postgresql12-docs-12.14-150200.8.41.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
postgresql12-12.14-150200.8.41.1
postgresql12-contrib-12.14-150200.8.41.1
postgresql12-contrib-debuginfo-12.14-150200.8.41.1
postgresql12-debuginfo-12.14-150200.8.41.1
postgresql12-debugsource-12.14-150200.8.41.1
postgresql12-devel-12.14-150200.8.41.1
postgresql12-devel-debuginfo-12.14-150200.8.41.1
postgresql12-plperl-12.14-150200.8.41.1
postgresql12-plperl-debuginfo-12.14-150200.8.41.1
postgresql12-plpython-12.14-150200.8.41.1
postgresql12-plpython-debuginfo-12.14-150200.8.41.1
postgresql12-pltcl-12.14-150200.8.41.1
postgresql12-pltcl-debuginfo-12.14-150200.8.41.1
postgresql12-server-12.14-150200.8.41.1
postgresql12-server-debuginfo-12.14-150200.8.41.1
postgresql12-server-devel-12.14-150200.8.41.1
postgresql12-server-devel-debuginfo-12.14-150200.8.41.1
- SUSE Enterprise Storage 7 (noarch):
postgresql12-docs-12.14-150200.8.41.1
References:
https://www.suse.com/security/cve/CVE-2022-41862.html
https://bugzilla.suse.com/1208102
1
0
openSUSE-SU-2023:0053-1: moderate: Security update for timescaledb
by opensuse-security@opensuse.org 19 Feb '23
by opensuse-security@opensuse.org 19 Feb '23
19 Feb '23
openSUSE Security Update: Security update for timescaledb
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0053-1
Rating: moderate
References: #1197063
Cross-References: CVE-2022-24128
CVSS scores:
CVE-2022-24128 (NVD) : 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for timescaledb fixes the following issues:
timescaledb was updated to version 2.9.3
- https://github.com/timescale/timescaledb/releases/tag/2.9.3
- enable postgresql15 build
- https://github.com/timescale/timescaledb/releases/tag/2.9.2
- https://github.com/timescale/timescaledb/releases/tag/2.9.1
- https://github.com/timescale/timescaledb/releases/tag/2.9.0
- https://github.com/timescale/timescaledb/releases/tag/2.8.1
- https://github.com/timescale/timescaledb/releases/tag/2.8.0
- https://github.com/timescale/timescaledb/releases/tag/2.7.1
- https://github.com/timescale/timescaledb/releases/tag/2.7.2
- https://github.com/timescale/timescaledb/releases/tag/2.7.0
- https://github.com/timescale/timescaledb/releases/tag/2.6.1
- CVE-2022-24128: Fixed privilege escalation during extension installation
(boo#1197063)
- https://github.com/timescale/timescaledb/releases/tag/2.6.0
- https://github.com/timescale/timescaledb/releases/tag/2.5.2
- https://github.com/timescale/timescaledb/releases/tag/2.5.1
- switch to %{pg_name}-server-devel
- https://github.com/timescale/timescaledb/releases/tag/1.7.5
- https://github.com/timescale/timescaledb/releases/tag/2.0.0
- https://github.com/timescale/timescaledb/releases/tag/2.0.1
- https://github.com/timescale/timescaledb/releases/tag/2.0.2
- https://github.com/timescale/timescaledb/releases/tag/2.1.0
- https://github.com/timescale/timescaledb/releases/tag/2.1.1
- https://github.com/timescale/timescaledb/releases/tag/2.2.0
- https://github.com/timescale/timescaledb/releases/tag/2.2.1
- https://github.com/timescale/timescaledb/releases/tag/2.3.0
- https://github.com/timescale/timescaledb/releases/tag/2.3.1
- https://github.com/timescale/timescaledb/releases/tag/2.4.0
- https://github.com/timescale/timescaledb/releases/tag/2.4.1
- https://github.com/timescale/timescaledb/releases/tag/2.4.2
- https://github.com/timescale/timescaledb/releases/tag/2.5.0
- enable postgresql14
- https://github.com/timescale/timescaledb/releases/tag/1.7.2
- https://github.com/timescale/timescaledb/releases/tag/1.7.3
- https://github.com/timescale/timescaledb/releases/tag/1.7.4
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2023-53=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 ppc64le s390x x86_64):
postgresql12-timescaledb-2.9.3-bp153.2.3.1
postgresql13-timescaledb-2.9.3-bp153.2.3.1
postgresql14-timescaledb-2.9.3-bp153.2.3.1
postgresql15-timescaledb-2.9.3-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2022-24128.html
https://bugzilla.suse.com/1197063
1
0
openSUSE-SU-2023:0048-1: moderate: Security update for gssntlmssp
by opensuse-security@opensuse.org 18 Feb '23
by opensuse-security@opensuse.org 18 Feb '23
18 Feb '23
openSUSE Security Update: Security update for gssntlmssp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0048-1
Rating: moderate
References: #1208278 #1208279 #1208280 #1208281 #1208282
Cross-References: CVE-2023-25563 CVE-2023-25564 CVE-2023-25565
CVE-2023-25566 CVE-2023-25567
CVSS scores:
CVE-2023-25563 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-25564 (NVD) : 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
CVE-2023-25565 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-25566 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-25567 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for gssntlmssp fixes the following issues:
Update to version 1.2.0
* Implement gss_set_cred_option.
* Allow to gss_wrap even if NEGOTIATE_SEAL is not negotiated.
* Move HMAC code to OpenSSL EVP API.
* Fix crash bug when acceptor credentials are NULL.
* Translations update from Fedora Weblate.
Fix security issues:
* CVE-2023-25563 (boo#1208278): multiple out-of-bounds read when decoding
NTLM fields.
* CVE-2023-25564 (boo#1208279): memory corruption when decoding UTF16
strings.
* CVE-2023-25565 (boo#1208280): incorrect free when decoding target
information.
* CVE-2023-25566 (boo#1208281): memory leak when parsing usernames.
* CVE-2023-25567 (boo#1208282): out-of-bounds read when decoding target
information.
Update to version 1.1
* various build fixes and better compatibility when a MIC is requested.
Update to version 1.0
* Fix test_gssapi_rfc5587.
* Actually run tests with make check.
* Add two tests around NTLMSSP_NEGOTIATE_LMKEY.
* Refine LM compatibility level logic.
* Refactor the gssntlm_required_security function.
* Implement reading LM/NT hashes.
* Add test for smpasswd-like user files.
* Return confidentiality status.
* Fix segfault in sign/seal functions.
* Fix dummy signature generation.
* Use UCS16LE instead of UCS-2LE.
* Provide a zero lm key if the password is too long.
* Completely omit CBs AV pairs when no CB provided.
* Change license to the more permissive ISC.
* Do not require cached users with winbind.
* Add ability to pass keyfile via cred store.
* Remove unused parts of Makefile.am.
* Move attribute names to allocated strings.
* Adjust serialization for name attributes.
* Fix crash in acquiring credentials.
* Fix fallback to external_creds interface.
* Introduce parse_user_name() function.
* Add test for parse_user_name.
* Change how we assemble user names in ASC.
* Use thread local storage for winbind context.
* Make per thread winbind context optional.
* Fixed memleak of usr_cred.
* Support get_sids request via name attributes.
* Fixed memory leaks found by valgrind.
- Update to version 0.9
* add support for getting session key.
* Add gss_inquire_attrs_for_mech().
* Return actual data for RFC5587 API.
* Add new Windows version flags.
* Add Key exchange also when wanting integrity only.
* Drop support for GSS_C_MA_NOT_DFLT_MECH.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-48=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64):
gssntlmssp-1.2.0-bp154.2.3.1
gssntlmssp-devel-1.2.0-bp154.2.3.1
References:
https://www.suse.com/security/cve/CVE-2023-25563.html
https://www.suse.com/security/cve/CVE-2023-25564.html
https://www.suse.com/security/cve/CVE-2023-25565.html
https://www.suse.com/security/cve/CVE-2023-25566.html
https://www.suse.com/security/cve/CVE-2023-25567.html
https://bugzilla.suse.com/1208278
https://bugzilla.suse.com/1208279
https://bugzilla.suse.com/1208280
https://bugzilla.suse.com/1208281
https://bugzilla.suse.com/1208282
1
0
SUSE-SU-2023:0443-1: important: Security update for mozilla-nss
by opensuse-security@opensuse.org 17 Feb '23
by opensuse-security@opensuse.org 17 Feb '23
17 Feb '23
SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0443-1
Rating: important
References: #1208138
Cross-References: CVE-2023-0767
CVSS scores:
CVE-2023-0767 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mozilla-nss fixes the following issues:
Updated to NSS 3.79.4 (bsc#1208138):
- CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2023-443=1
- SUSE Manager Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-443=1
- SUSE Manager Retail Branch Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-443=1
- SUSE Manager Proxy 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-443=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-443=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-443=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-443=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-443=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-443=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-443=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-443=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-443=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-443=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-443=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-443=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-443=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-443=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-443=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2023-443=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Manager Server 4.2 (ppc64le s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Manager Server 4.2 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Manager Retail Branch Server 4.2 (x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Manager Proxy 4.2 (x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Enterprise Storage 7.1 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
- SUSE Enterprise Storage 7 (x86_64):
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
- SUSE CaaS Platform 4.0 (x86_64):
libfreebl3-3.79.4-150000.3.93.1
libfreebl3-32bit-3.79.4-150000.3.93.1
libfreebl3-32bit-debuginfo-3.79.4-150000.3.93.1
libfreebl3-debuginfo-3.79.4-150000.3.93.1
libfreebl3-hmac-3.79.4-150000.3.93.1
libfreebl3-hmac-32bit-3.79.4-150000.3.93.1
libsoftokn3-3.79.4-150000.3.93.1
libsoftokn3-32bit-3.79.4-150000.3.93.1
libsoftokn3-32bit-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-debuginfo-3.79.4-150000.3.93.1
libsoftokn3-hmac-3.79.4-150000.3.93.1
libsoftokn3-hmac-32bit-3.79.4-150000.3.93.1
mozilla-nss-3.79.4-150000.3.93.1
mozilla-nss-32bit-3.79.4-150000.3.93.1
mozilla-nss-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-3.79.4-150000.3.93.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-certs-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-debugsource-3.79.4-150000.3.93.1
mozilla-nss-devel-3.79.4-150000.3.93.1
mozilla-nss-sysinit-3.79.4-150000.3.93.1
mozilla-nss-sysinit-debuginfo-3.79.4-150000.3.93.1
mozilla-nss-tools-3.79.4-150000.3.93.1
mozilla-nss-tools-debuginfo-3.79.4-150000.3.93.1
References:
https://www.suse.com/security/cve/CVE-2023-0767.html
https://bugzilla.suse.com/1208138
1
0
SUSE-SU-2023:0444-1: important: Security update for rubygem-actionpack-5_1
by opensuse-security@opensuse.org 17 Feb '23
by opensuse-security@opensuse.org 17 Feb '23
17 Feb '23
SUSE Security Update: Security update for rubygem-actionpack-5_1
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0444-1
Rating: important
References: #1207451 #1207455
Cross-References: CVE-2023-22792 CVE-2023-22795
CVSS scores:
CVE-2023-22792 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-22795 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise High Availability 15-SP1
SUSE Linux Enterprise High Availability 15-SP2
SUSE Linux Enterprise High Availability 15-SP3
SUSE Linux Enterprise High Availability 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for rubygem-actionpack-5_1 fixes the following issues:
- CVE-2023-22795: Fixed ReDoS in Action Dispatch cache (bsc#1207451).
- CVE-2023-22792: Fixed ReDoS in Action Dispatch cookies (bnc#1207455).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-444=1
- SUSE Linux Enterprise High Availability 15-SP4:
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2023-444=1
- SUSE Linux Enterprise High Availability 15-SP3:
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2023-444=1
- SUSE Linux Enterprise High Availability 15-SP2:
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2023-444=1
- SUSE Linux Enterprise High Availability 15-SP1:
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2023-444=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.15.1
ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.15.1
- SUSE Linux Enterprise High Availability 15-SP4 (aarch64 ppc64le s390x x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.15.1
- SUSE Linux Enterprise High Availability 15-SP3 (aarch64 ppc64le s390x x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.15.1
- SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.15.1
- SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.15.1
References:
https://www.suse.com/security/cve/CVE-2023-22792.html
https://www.suse.com/security/cve/CVE-2023-22795.html
https://bugzilla.suse.com/1207451
https://bugzilla.suse.com/1207455
1
0
SUSE-SU-2023:0435-1: moderate: Security update for java-17-openjdk
by opensuse-security@opensuse.org 16 Feb '23
by opensuse-security@opensuse.org 16 Feb '23
16 Feb '23
SUSE Security Update: Security update for java-17-openjdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0435-1
Rating: moderate
References: #1205916 #1207246 #1207248
Cross-References: CVE-2023-21835 CVE-2023-21843
CVSS scores:
CVE-2023-21835 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2023-21835 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2023-21843 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21843 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for java-17-openjdk fixes the following issues:
Updated to version jdk-17.0.6.0+10:
- CVE-2023-21835: Fixed handshake DoS attack against DTLS connections
(bsc#1207246).
- CVE-2023-21843: Fixed soundbank URL remote loading (bsc#1207248).
Bugfixes:
- Avoid calling C_GetInfo() too early, before cryptoki is initialized
(bsc#1205916).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-435=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-435=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
java-17-openjdk-17.0.6.0-150400.3.12.1
java-17-openjdk-accessibility-17.0.6.0-150400.3.12.1
java-17-openjdk-accessibility-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-debugsource-17.0.6.0-150400.3.12.1
java-17-openjdk-demo-17.0.6.0-150400.3.12.1
java-17-openjdk-devel-17.0.6.0-150400.3.12.1
java-17-openjdk-devel-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-headless-17.0.6.0-150400.3.12.1
java-17-openjdk-headless-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-jmods-17.0.6.0-150400.3.12.1
java-17-openjdk-src-17.0.6.0-150400.3.12.1
- openSUSE Leap 15.4 (noarch):
java-17-openjdk-javadoc-17.0.6.0-150400.3.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
java-17-openjdk-17.0.6.0-150400.3.12.1
java-17-openjdk-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-debugsource-17.0.6.0-150400.3.12.1
java-17-openjdk-demo-17.0.6.0-150400.3.12.1
java-17-openjdk-devel-17.0.6.0-150400.3.12.1
java-17-openjdk-devel-debuginfo-17.0.6.0-150400.3.12.1
java-17-openjdk-headless-17.0.6.0-150400.3.12.1
java-17-openjdk-headless-debuginfo-17.0.6.0-150400.3.12.1
References:
https://www.suse.com/security/cve/CVE-2023-21835.html
https://www.suse.com/security/cve/CVE-2023-21843.html
https://bugzilla.suse.com/1205916
https://bugzilla.suse.com/1207246
https://bugzilla.suse.com/1207248
1
0
SUSE-SU-2023:0434-1: important: Security update for mozilla-nss
by opensuse-security@opensuse.org 16 Feb '23
by opensuse-security@opensuse.org 16 Feb '23
16 Feb '23
SUSE Security Update: Security update for mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0434-1
Rating: important
References: #1208138
Cross-References: CVE-2023-0767
CVSS scores:
CVE-2023-0767 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mozilla-nss fixes the following issues:
Updated to NSS 3.79.4 (bsc#1208138):
- CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-434=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-434=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-434=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2023-434=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
libfreebl3-3.79.4-150400.3.26.1
libfreebl3-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-3.79.4-150400.3.26.1
libsoftokn3-3.79.4-150400.3.26.1
libsoftokn3-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-3.79.4-150400.3.26.1
mozilla-nss-3.79.4-150400.3.26.1
mozilla-nss-certs-3.79.4-150400.3.26.1
mozilla-nss-certs-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debugsource-3.79.4-150400.3.26.1
mozilla-nss-tools-3.79.4-150400.3.26.1
mozilla-nss-tools-debuginfo-3.79.4-150400.3.26.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libfreebl3-3.79.4-150400.3.26.1
libfreebl3-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-3.79.4-150400.3.26.1
libsoftokn3-3.79.4-150400.3.26.1
libsoftokn3-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-3.79.4-150400.3.26.1
mozilla-nss-3.79.4-150400.3.26.1
mozilla-nss-certs-3.79.4-150400.3.26.1
mozilla-nss-certs-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debugsource-3.79.4-150400.3.26.1
mozilla-nss-devel-3.79.4-150400.3.26.1
mozilla-nss-sysinit-3.79.4-150400.3.26.1
mozilla-nss-sysinit-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-tools-3.79.4-150400.3.26.1
mozilla-nss-tools-debuginfo-3.79.4-150400.3.26.1
- openSUSE Leap 15.4 (x86_64):
libfreebl3-32bit-3.79.4-150400.3.26.1
libfreebl3-32bit-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-32bit-3.79.4-150400.3.26.1
libsoftokn3-32bit-3.79.4-150400.3.26.1
libsoftokn3-32bit-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-32bit-3.79.4-150400.3.26.1
mozilla-nss-32bit-3.79.4-150400.3.26.1
mozilla-nss-32bit-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-certs-32bit-3.79.4-150400.3.26.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-sysinit-32bit-3.79.4-150400.3.26.1
mozilla-nss-sysinit-32bit-debuginfo-3.79.4-150400.3.26.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
libfreebl3-3.79.4-150400.3.26.1
libfreebl3-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-3.79.4-150400.3.26.1
libsoftokn3-3.79.4-150400.3.26.1
libsoftokn3-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-3.79.4-150400.3.26.1
mozilla-nss-3.79.4-150400.3.26.1
mozilla-nss-certs-3.79.4-150400.3.26.1
mozilla-nss-certs-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debugsource-3.79.4-150400.3.26.1
mozilla-nss-devel-3.79.4-150400.3.26.1
mozilla-nss-sysinit-3.79.4-150400.3.26.1
mozilla-nss-sysinit-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-tools-3.79.4-150400.3.26.1
mozilla-nss-tools-debuginfo-3.79.4-150400.3.26.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libfreebl3-32bit-3.79.4-150400.3.26.1
libfreebl3-32bit-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-32bit-3.79.4-150400.3.26.1
libsoftokn3-32bit-3.79.4-150400.3.26.1
libsoftokn3-32bit-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-32bit-3.79.4-150400.3.26.1
mozilla-nss-32bit-3.79.4-150400.3.26.1
mozilla-nss-32bit-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-certs-32bit-3.79.4-150400.3.26.1
mozilla-nss-certs-32bit-debuginfo-3.79.4-150400.3.26.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
libfreebl3-3.79.4-150400.3.26.1
libfreebl3-debuginfo-3.79.4-150400.3.26.1
libfreebl3-hmac-3.79.4-150400.3.26.1
libsoftokn3-3.79.4-150400.3.26.1
libsoftokn3-debuginfo-3.79.4-150400.3.26.1
libsoftokn3-hmac-3.79.4-150400.3.26.1
mozilla-nss-3.79.4-150400.3.26.1
mozilla-nss-certs-3.79.4-150400.3.26.1
mozilla-nss-certs-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debuginfo-3.79.4-150400.3.26.1
mozilla-nss-debugsource-3.79.4-150400.3.26.1
mozilla-nss-tools-3.79.4-150400.3.26.1
mozilla-nss-tools-debuginfo-3.79.4-150400.3.26.1
References:
https://www.suse.com/security/cve/CVE-2023-0767.html
https://bugzilla.suse.com/1208138
1
0
SUSE-SU-2023:0433-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 16 Feb '23
by opensuse-security@opensuse.org 16 Feb '23
16 Feb '23
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0433-1
Rating: important
References: #1065729 #1185861 #1185863 #1186449 #1191256
#1192868 #1193629 #1194869 #1195175 #1195655
#1196058 #1199701 #1204063 #1204356 #1204662
#1205495 #1206006 #1206036 #1206056 #1206057
#1206258 #1206363 #1206459 #1206616 #1206677
#1206784 #1207010 #1207034 #1207036 #1207050
#1207125 #1207134 #1207149 #1207158 #1207184
#1207186 #1207190 #1207237 #1207263 #1207269
#1207497 #1207500 #1207501 #1207506 #1207507
#1207734 #1207769 #1207795 #1207842 #1207878
#1207933 SLE-21132 SLE-24682
Cross-References: CVE-2020-24588 CVE-2022-4382 CVE-2022-47929
CVE-2023-0122 CVE-2023-0179 CVE-2023-0266
CVE-2023-0590 CVE-2023-23454 CVE-2023-23455
CVSS scores:
CVE-2020-24588 (NVD) : 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2020-24588 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-4382 (NVD) : 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-4382 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-47929 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-47929 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
CVE-2023-0122 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-0122 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-0179 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-0266 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-0266 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-0590 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-23454 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2023-23454 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-23455 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2023-23455 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Availability 15-SP4
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Module for Legacy Software 15-SP4
SUSE Linux Enterprise Module for Live Patching 15-SP4
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Workstation Extension 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that solves 9 vulnerabilities, contains two
features and has 42 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in
net/sched/sch_atm.c because of type confusion (non-negative numbers can
sometimes indicate a TC_ACT_SHOT condition rather than valid
classification results) (bsc#1207125).
- CVE-2023-23454: Fixed denial or service in cbq_classify in
net/sched/sch_cbq.c (bnc#1207036).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0266: Fixed a use-after-free vulnerability inside the ALSA PCM
package. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 was missing locks that
could have been used in a use-after-free that could have resulted in a
priviledge escalation to gain ring0 access from the system user
(bsc#1207134).
- CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header
bits (bsc#1207034).
- CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in
nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth
Denial of Service (DoS) attack on a remote machine (bnc#1207050).
- CVE-2022-4382: Fixed a use-after-free flaw that was caused by a race
condition among the superblock operations inside the gadgetfs code
(bsc#1206258).
- CVE-2020-24588: Fixed injection of arbitrary network packets against
devices that support receiving non-SSP A-MSDU frames (which is mandatory
as part of 802.11n) (bsc#1199701).
The following non-security bugs were fixed:
- ACPI: EC: Fix EC address space handler unregistration (bsc#1207149).
- ACPI: EC: Fix ECDT probe ordering issues (bsc#1207149).
- ACPI: PRM: Check whether EFI runtime is available (git-fixes).
- ACPICA: Allow address_space_handler Install and _REG execution as 2
separate steps (bsc#1207149).
- ACPICA: include/acpi/acpixf.h: Fix indentation (bsc#1207149).
- ALSA: control-led: use strscpy in set_led_id() (git-fixes).
- ALSA: hda - Enable headset mic on another Dell laptop with ALC3254
(git-fixes).
- ALSA: hda/hdmi: Add a HP device 0x8715 to force connect list (git-fixes).
- ALSA: hda/realtek - Turn on power early (git-fixes).
- ALSA: hda/realtek: Add Acer Predator PH315-54 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs on HP Spectre x360 13-aw0xxx
(git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform
(git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP
platform (git-fixes).
- ALSA: hda/via: Avoid potential array out-of-bound in
add_secret_dac_path() (git-fixes).
- ALSA: hda: cs35l41: Check runtime suspend capability at runtime_idle
(git-fixes).
- ALSA: hda: cs35l41: Do not return -EINVAL from system suspend/resume
(git-fixes).
- ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
(git-fixes).
- ALSA: usb-audio: Make sure to stop endpoints before closing EPs
(git-fixes).
- ALSA: usb-audio: Relax hw constraints for implicit fb sync (git-fixes).
- ARM: dts: at91: sam9x60: fix the ddr clock for sam9x60 (git-fixes).
- ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts' (git-fixes).
- ARM: dts: imx6ul-pico-dwarf: Use 'clock-frequency' (git-fixes).
- ARM: dts: imx7d-pico: Use 'clock-frequency' (git-fixes).
- ARM: dts: imx: Fix pca9547 i2c-mux node name (git-fixes).
- ARM: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes).
- ARM: imx: add missing of_node_put() (git-fixes).
- ASoC: Intel: bytcr_rt5651: Drop reference count of ACPI device after use
(git-fixes).
- ASoC: Intel: bytcr_wm5102: Drop reference count of ACPI device after use
(git-fixes).
- ASoC: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes).
- ASoC: fsl_micfil: Correct the number of steps on SX controls (git-fixes).
- ASoC: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC
(git-fixes).
- ASoC: qcom: lpass-cpu: Fix fallback SD line index handling (git-fixes).
- ASoC: wm8904: fix wrong outputs volume after power reactivation
(git-fixes).
- Bluetooth: Fix possible deadlock in rfcomm_sk_state_change (git-fixes).
- Bluetooth: hci_qca: Fix driver shutdown on closed serdev (git-fixes).
- Documentation: Remove bogus claim about del_timer_sync() (git-fixes).
- HID: betop: check shape of output reports (git-fixes).
- HID: betop: check shape of output reports (git-fixes, bsc#1207186).
- HID: check empty report_list in bigben_probe() (git-fixes).
- HID: check empty report_list in hid_validate_values() (git-fixes).
- HID: drop assumptions on non-empty lists (git-fixes, bsc#1206784).
- HID: intel_ish-hid: Add check for ishtp_dma_tx_map (git-fixes).
- HID: playstation: sanity check DualSense calibration data (git-fixes).
- HID: revert CHERRY_MOUSE_000C quirk (git-fixes).
- IB/hfi1: Fix expected receive setup error exit issues (git-fixes)
- IB/hfi1: Immediately remove invalid memory from hardware (git-fixes)
- IB/hfi1: Reject a zero-length user expected buffer (git-fixes)
- IB/hfi1: Remove user expected buffer invalidate race (git-fixes)
- IB/hfi1: Reserve user expected TIDs (git-fixes)
- IB/mad: Do not call to function that might sleep while in atomic context
(git-fixes).
- KVM: x86: Check for existing Hyper-V vCPU in kvm_hv_vcpu_init()
(bsc#1206616).
- PCI/PM: Define pci_restore_standard_config() only for CONFIG_PM_SLEEP
(bsc#1207269).
- PM: AVS: qcom-cpr: Fix an error handling path in cpr_probe() (git-fixes).
- RDMA/core: Fix ib block iterator counter overflow (bsc#1207878).
- RDMA/core: Fix ib block iterator counter overflow (git-fixes)
- RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes)
- RDMA/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes)
- RDMA/rxe: Prevent faulty rkey generation (git-fixes)
- RDMA/srp: Move large values to a new enum for gcc13 (git-fixes)
- Revert "ARM: dts: armada-38x: Fix compatible string for gpios"
(git-fixes).
- Revert "ARM: dts: armada-39x: Fix compatible string for gpios"
(git-fixes).
- Revert "Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to
RMI mode" (git-fixes).
- Revert "Revert "block, bfq: honor already-setup queue merges""
(git-fixes).
- Revert "arm64: dts: meson-sm1-odroid-hc4: disable unused USB PHY0"
(git-fixes).
- Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"
(git-fixes).
- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- SUNRPC: Use BIT() macro in rpc_show_xprt_state() (git-fixes).
- USB: gadget: Fix use-after-free during usb config switch (git-fixes).
- USB: misc: iowarrior: fix up header size for
USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).
- USB: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes).
- USB: serial: option: add Quectel EC200U modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (CS) modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
- USB: serial: option: add Quectel EM05CN (SG) modem (git-fixes).
- USB: serial: option: add Quectel EM05CN modem (git-fixes).
- VMCI: Use threaded irqs instead of tasklets (git-fixes).
- arm64: atomics: format whitespace consistently (git-fixes).
- arm64: dts: imx8mm-beacon: Fix ecspi2 pinmux (git-fixes).
- arm64: dts: imx8mm-venice-gw7901: fix USB2 controller OC polarity
(git-fixes).
- arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes).
- arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes).
- arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes).
- arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes).
- arm64: dts: qcom: msm8992: Do not use sfpb mutex (git-fixes).
- arm64: efi: Execute runtime services from a dedicated stack (git-fixes).
- ata: libata: Fix sata_down_spd_limit() when no link speed is reported
(git-fixes).
- ath11k: Fix unexpected return buffer manager error for QCA6390
(git-fixes).
- bcache: fix set_at_max_writeback_rate() for multiple attached devices
(git-fixes).
- bfq: fix use-after-free in bfq_dispatch_request (git-fixes).
- bfq: fix waker_bfqq inconsistency crash (git-fixes).
- blk-throttle: prevent overflow while calculating wait time (git-fixes).
- blk-wbt: fix that 'rwb->wc' is always set to 1 in wbt_init() (git-fixes).
- blktrace: Fix output non-blktrace event when blk_classic option enabled
(git-fixes).
- block, bfq: do not move oom_bfqq (git-fixes).
- block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes).
- block, bfq: fix possible uaf for 'bfqq->bic' (git-fixes).
- block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes).
- block, bfq: protect 'bfqd->queued' by 'bfqd->lock' (git-fixes).
- block/bfq_wf2q: correct weight to ioprio (git-fixes).
- block/bio: remove duplicate append pages code (git-fixes).
- block: check minor range in device_add_disk() (git-fixes).
- block: ensure iov_iter advances for added pages (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: mq-deadline: Fix dd_finish_request() for zoned devices
(git-fixes).
- block: use bdev_get_queue() in bio.c (git-fixes).
- bnx2x: fix pci device refcount leak in bnx2x_vf_is_pcie_pending()
(git-fixes).
- bnxt_en: Fix possible crash in bnxt_hwrm_set_coal() (git-fixes).
- bnxt_en: Remove debugfs when pci_register_driver failed (git-fixes).
- bnxt_en: add dynamic debug support for HWRM messages (git-fixes).
- bnxt_en: fix potentially incorrect return value for ndo_rx_flow_steer
(git-fixes).
- bnxt_en: fix the handling of PCIE-AER (git-fixes).
- bnxt_en: refactor bnxt_cancel_reservations() (git-fixes).
- btrfs: add helper to delete a dir entry from a log tree (bsc#1207263).
- btrfs: avoid inode logging during rename and link when possible
(bsc#1207263).
- btrfs: avoid logging all directory changes during renames (bsc#1207263).
- btrfs: backport recent fixes for send/receive into SLE15 SP4/SP5
(bsc#1206036 bsc#1207500 ltc#201363).
- btrfs: do not log unnecessary boundary keys when logging directory
(bsc#1207263).
- btrfs: fix assertion failure when logging directory key range item
(bsc#1207263).
- btrfs: fix processing of delayed data refs during backref walking
(bsc#1206056 bsc#1207507 ltc#201367).
- btrfs: fix processing of delayed tree block refs during backref walking
(bsc#1206057 bsc#1207506 ltc#201368).
- btrfs: fix race between quota enable and quota rescan ioctl
(bsc#1207158).
- btrfs: fix race between quota rescan and disable leading to NULL pointer
deref (bsc#1207158).
- btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes).
- btrfs: join running log transaction when logging new name (bsc#1207263).
- btrfs: move QUOTA_ENABLED check to rescan_should_stop from
btrfs_qgroup_rescan_worker (bsc#1207158).
- btrfs: pass the dentry to btrfs_log_new_name() instead of the inode
(bsc#1207263).
- btrfs: prepare extents to be logged before locking a log tree path
(bsc#1207263).
- btrfs: put initial index value of a directory in a constant
(bsc#1207263).
- btrfs: qgroup: remove duplicated check in adding qgroup relations
(bsc#1207158).
- btrfs: qgroup: remove outdated TODO comments (bsc#1207158).
- btrfs: remove unnecessary NULL check for the new inode during rename
exchange (bsc#1207263).
- btrfs: remove useless path release in the fast fsync path (bsc#1207263).
- btrfs: remove write and wait of struct walk_control (bsc#1207263).
- btrfs: stop copying old dir items when logging a directory (bsc#1207263).
- btrfs: stop doing unnecessary log updates during a rename (bsc#1207263).
- btrfs: stop trying to log subdirectories created in past transactions
(bsc#1207263).
- btrfs: use single variable to track return value at btrfs_log_inode()
(bsc#1207263).
- bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes).
- can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
(git-fixes).
- cifs: Fix uninitialized memory read for smb311 posix symlink create
(git-fixes).
- cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629).
- cifs: do not include page data when checking signature (git-fixes).
- cifs: do not query ifaces on smb1 mounts (git-fixes).
- cifs: don't take exclusive lock for updating target hints (bsc#1193629).
- cifs: fix double free on failed kerberos auth (git-fixes).
- cifs: fix file info setting in cifs_open_file() (git-fixes).
- cifs: fix file info setting in cifs_query_path_info() (git-fixes).
- cifs: fix potential deadlock in cache_refresh_path() (git-fixes).
- cifs: fix potential memory leaks in session setup (bsc#1193629).
- cifs: fix race in assemble_neg_contexts() (bsc#1193629).
- cifs: fix return of uninitialized rc in dfs_cache_update_tgthint()
(bsc#1193629).
- cifs: handle cache lookup errors different than -ENOENT (bsc#1193629).
- cifs: ignore ipc reconnect failures during dfs failover (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{dstaddr,hostname}
(bsc#1193629).
- cifs: remove duplicate code in __refresh_tcon() (bsc#1193629).
- cifs: remove redundant assignment to the variable match (bsc#1193629).
- cifs: remove unused function (bsc#1193629).
- comedi: adv_pci1760: Fix PWM instruction handling (git-fixes).
- config: arm64: Fix Freescale LPUART dependency (boo#1204063).
- cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes).
- cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes).
- crypto: fixed DH and ECDH implemention for FIPS PCT
(jsc#SLE-21132,bsc#1191256,bsc#1207184).
- dm btree: add a defensive bounds check to insert_at() (git-fixes).
- dm cache: Fix ABBA deadlock between shrink_slab and
dm_cache_metadata_abort (git-fixes).
- dm cache: Fix UAF in destroy() (git-fixes).
- dm cache: set needs_check flag after aborting metadata (git-fixes).
- dm clone: Fix UAF in clone_dtr() (git-fixes).
- dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes).
- dm integrity: clear the journal on suspend (git-fixes).
- dm integrity: flush the journal on suspend (git-fixes).
- dm ioctl: fix misbehavior if list_versions races with module loading
(git-fixes).
- dm ioctl: prevent potential spectre v1 gadget (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm space map common: add bounds check to sm_ll_lookup_bitmap()
(git-fixes).
- dm thin: Fix ABBA deadlock between shrink_slab and
dm_pool_abort_metadata (git-fixes).
- dm thin: Fix UAF in run_timer_softirq() (git-fixes).
- dm thin: Use last transaction's pmd->root when commit failed (git-fixes).
- dm thin: resume even if in FAIL mode (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix alloc_dax error handling in alloc_dev (git-fixes).
- dm: requeue IO if mapping table not yet available (git-fixes).
- dmaengine: Fix double increment of client_count in dma_chan_get()
(git-fixes).
- dmaengine: idxd: Do not call DMX TX callbacks during workqueue disable
(git-fixes).
- dmaengine: idxd: Let probe fail when workqueue cannot be enabled
(git-fixes).
- dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init
(git-fixes).
- dmaengine: lgm: Move DT parsing after initialization (git-fixes).
- dmaengine: tegra210-adma: fix global intr clear (git-fixes).
- dmaengine: ti: k3-udma: Do conditional decrement of
UDMA_CHAN_RT_PEER_BCNT_REG (git-fixes).
- dmaengine: xilinx_dma: call of_node_put() when breaking out of
for_each_child_of_node() (git-fixes).
- docs: Fix the docs build with Sphinx 6.0 (git-fixes).
- driver core: Fix test_async_probe_init saves device in wrong array
(git-fixes).
- drivers: net: xgene: disable napi when register irq failed in
xgene_enet_open() (git-fixes).
- drivers:md:fix a potential use-after-free bug (git-fixes).
- drm/amd/display: Calculate output_color_space after pixel encoding
adjustment (git-fixes).
- drm/amd/display: Fix COLOR_SPACE_YCBCR2020_TYPE matrix (git-fixes).
- drm/amd/display: Fix set scaling doesn's work (git-fixes).
- drm/amd/display: Take emulated dc_sink into account for HDCP
(bsc#1207734).
- drm/amd/display: fix issues with driver unload (git-fixes).
- drm/amdgpu: complete gfxoff allow signal during suspend without delay
(git-fixes).
- drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2)
(git-fixes).
- drm/amdgpu: drop experimental flag on aldebaran (git-fixes).
- drm/hyperv: Add error message for fb size greater than allocated
(git-fixes).
- drm/i915/adlp: Fix typo for reference clock (git-fixes).
- drm/i915/display: Check source height is > 0 (git-fixes).
- drm/i915/gt: Reset twice (git-fixes).
- drm/i915/selftest: fix intel_selftest_modify_policy argument types
(git-fixes).
- drm/i915: Fix potential bit_17 double-free (git-fixes).
- drm/i915: re-disable RC6p on Sandy Bridge (git-fixes).
- drm/msm/adreno: Make adreno quirks not overwrite each other (git-fixes).
- drm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux
transfer (git-fixes).
- drm/msm: another fix for the headless Adreno GPU (git-fixes).
- drm/panfrost: fix GENERIC_ATOMIC64 dependency (git-fixes).
- drm/vc4: hdmi: make CEC adapter name unique (git-fixes).
- drm/virtio: Fix GEM handle creation UAF (git-fixes).
- drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes).
- dt-bindings: msm/dsi: Do not require vcca-supply on 14nm PHY (git-fixes).
- dt-bindings: msm/dsi: Do not require vdds-supply on 10nm PHY (git-fixes).
- dt-bindings: msm: dsi-controller-main: Fix description of core clock
(git-fixes).
- dt-bindings: msm: dsi-controller-main: Fix operating-points-v2
constraint (git-fixes).
- dt-bindings: msm: dsi-phy-28nm: Add missing qcom,
dsi-phy-regulator-ldo-mode (git-fixes).
- efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes).
- efi: fix userspace infinite retry read efivars after EFI runtime
services page fault (git-fixes).
- efi: rt-wrapper: Add missing include (git-fixes).
- efi: tpm: Avoid READ_ONCE() for accessing the event log (git-fixes).
- ext4: Fixup pages without buffers (bsc#1205495).
- extcon: usbc-tusb320: fix kernel-doc warning (git-fixes).
- fbcon: Check font dimension limits (git-fixes).
- fbdev: omapfb: avoid stack overflow warning (git-fixes).
- firewire: fix memory leak for payload of request subaction to IEC
61883-1 FCP region (git-fixes).
- firmware: arm_scmi: Harden shared memory access in fetch_notification
(git-fixes).
- firmware: arm_scmi: Harden shared memory access in fetch_response
(git-fixes).
- fpga: stratix10-soc: Fix return value check in s10_ops_write_init()
(git-fixes).
- fs: remove __sync_filesystem (git-fixes).
- ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes).
- ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes).
- git_sort: add usb-linus branch for gregkh/usb
- gsmi: fix null-deref in gsmi_get_variable (git-fixes).
- hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
(git-fixes).
- i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes).
- i2c: mv64xxx: Remove shutdown method from driver (git-fixes).
- i40e: Disallow ip4 and ip6 l4_4_bytes (git-fixes).
- i40e: Fix error handling in i40e_init_module() (git-fixes).
- i40e: Fix not setting default xps_cpus after reset (git-fixes).
- igb: Allocate MSI-X vector when testing (git-fixes).
- iio: adc: berlin2-adc: Add missing of_node_put() in error path
(git-fixes).
- iio: adc: stm32-dfsdm: fill module aliases (git-fixes).
- iio: hid: fix the retval in accel_3d_capture_sample (git-fixes).
- iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes).
- iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes).
- iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes).
- iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes).
- iio: imu: fxos8700: fix failed initialization ODR mode assignment
(git-fixes).
- iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback
(git-fixes).
- iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes).
- iio: imu: fxos8700: fix map label of channel type to MAGN sensor
(git-fixes).
- iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback
(git-fixes).
- iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes).
- iio:adc:twl6030: Enable measurement of VAC (git-fixes).
- iio:adc:twl6030: Enable measurements of VUSB, VBAT and others
(git-fixes).
- ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459).
- ipmi:ssif: Increase the message retry time (bsc#1206459).
- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to
network (git-fixes).
- ixgbevf: Fix resource leak in ixgbevf_init_module() (git-fixes).
- jbd2: use the correct print format (git-fixes).
- kABI workaround for struct acpi_ec (bsc#1207149).
- kABI: Preserve TRACE_EVENT_FL values (git-fixes).
- kabi/severities: add mlx5 internal symbols
- l2tp: Do not sleep and disable BH under writer-side sk_callback_lock
(git-fixes).
- loop: Fix the max_loop commandline argument treatment when it is set to
0 (git-fixes).
- md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes).
- md: protect md_unregister_thread from reentrancy (git-fixes).
- mei: me: add meteor lake point M DID (git-fixes).
- memory: atmel-sdramc: Fix missing clk_disable_unprepare in
atmel_ramc_probe() (git-fixes).
- memory: mvebu-devbus: Fix missing clk_disable_unprepare in
mvebu_devbus_probe() (git-fixes).
- memory: tegra: Remove clients SID override programming (git-fixes).
- misc: fastrpc: Do not remove map on creater_process and device_release
(git-fixes).
- misc: fastrpc: Fix use-after-free race condition for maps (git-fixes).
- mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769).
- mm: compaction: kABI: avoid pglist_data kABI breakage (bsc#1207010).
- mm: compaction: support triggering of proactive compaction by user
(bsc#1207010).
- mmc: sdhci-esdhc-imx: correct the tuning start tap and step setting
(git-fixes).
- mmc: sunxi-mmc: Fix clock refcount imbalance during unbind (git-fixes).
- module: Do not wait for GOING modules (bsc#1196058, bsc#1186449,
bsc#1204356, bsc#1204662).
- mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes).
- mt76: mt7921: avoid unnecessary spin_lock/spin_unlock in
mt7921_mcu_tx_done_event (git-fixes).
- nbd: Fix hung on disconnect request if socket is closed before
(git-fixes).
- nbd: Fix hung when signal interrupts nbd_start_device_ioctl()
(git-fixes).
- nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes).
- nbd: fix io hung while disconnecting device (git-fixes).
- nbd: fix race between nbd_alloc_config() and module removal (git-fixes).
- net/mlx4: Check retval of mlx4_bitmap_init (git-fixes).
- net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175).
- net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842).
- net: cxgb3_main: disable napi when bind qsets failed in cxgb_up()
(git-fixes).
- net: ena: Fix error handling in ena_init() (git-fixes).
- net: liquidio: release resources when liquidio driver open failed
(git-fixes).
- net: liquidio: simplify if expression (git-fixes).
- net: macvlan: Use built-in RCU list checking (git-fixes).
- net: macvlan: fix memory leaks of macvlan_common_newlink (git-fixes).
- net: mdio: validate parameter addr in mdiobus_get_phy() (git-fixes).
- net: nfc: Fix use-after-free in local_cleanup() (git-fixes).
- net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices
(git-fixes).
- net: phy: meson-gxl: Add generic dummy stubs for MMD register access
(git-fixes).
- net: tun: Fix memory leaks of napi_get_frags (git-fixes).
- net: tun: Fix use-after-free in tun_detach() (git-fixes).
- net: tun: call napi_schedule_prep() to ensure we own a napi (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem
(git-fixes).
- net: usb: sr9700: Handle negative len (git-fixes).
- net: wan: Add checks for NULL for utdm in undo_uhdlc_init and
unmap_si_regs (git-fixes).
- netrom: Fix use-after-free caused by accept on already connected socket
(git-fixes).
- netrom: Fix use-after-free of a listening socket (git-fixes).
- nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes).
- null_blk: fix ida error handling in null_add_dev() (git-fixes).
- octeontx2-af: Fix reference count issue in rvu_sdp_init()
(jsc#SLE-24682).
- octeontx2-af: debugsfs: fix pci device refcount leak (git-fixes).
- octeontx2-pf: Add check for devm_kcalloc (git-fixes).
- octeontx2-pf: Fix potential memory leak in otx2_init_tc()
(jsc#SLE-24682).
- of/address: Return an error when no valid dma-ranges are found
(git-fixes).
- phy: Revert "phy: qualcomm: usb28nm: Add MDM9607 init sequence"
(git-fixes).
- phy: phy-can-transceiver: Skip warning if no "max-bitrate" (git-fixes).
- phy: rockchip-inno-usb2: Fix missing clk_disable_unprepare() in
rockchip_usb2phy_power_on() (git-fixes).
- phy: ti: fix Kconfig warning and operator precedence (git-fixes).
- pinctrl: amd: Add dynamic debugging for active GPIOs (git-fixes).
- pinctrl: rockchip: fix mux route data for rk3568 (git-fixes).
- platform/surface: aggregator: Add missing call to
ssam_request_sync_free() (git-fixes).
- platform/surface: aggregator: Ignore command messages not intended for
us (git-fixes).
- platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK
(git-fixes).
- platform/x86: dell-privacy: Fix SW_CAMERA_LENS_COVER reporting
(git-fixes).
- platform/x86: dell-privacy: Only register SW_CAMERA_LENS_COVER if
present (git-fixes).
- platform/x86: sony-laptop: Do not turn off 0x153 keyboard backlight
during probe (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD
(git-fixes).
- powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix crash with unaligned relocated kernel
(bsc#1194869).
- powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655
ltc#1195655 git-fixes).
- powerpc/kexec_file: Count hot-pluggable memory in FDT estimate
(bsc#1194869).
- powerpc/kexec_file: Fix division by zero in extra size estimation
(bsc#1194869).
- powerpc/rtas: avoid device tree lookups in rtas_os_term() (bsc#1065729).
- powerpc/rtas: avoid scheduling in rtas_os_term() (bsc#1065729).
- powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary
(bsc#1194869).
- powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned
(bsc#1194869).
- powerpc: move __end_rodata to cover arch read-only sections
(bsc#1194869).
- qlcnic: fix sleep-in-atomic-context bugs caused by msleep (git-fixes).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes).
- regulator: da9211: Use irq handler when ready (git-fixes).
- rpm/mkspec-dtb: add riscv64 dtb-renesas subpackage
- s390/qeth: fix various format strings (git-fixes).
- sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes)
- sched/core: Introduce sched_asym_cpucap_active() (git-fixes)
- sched/cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes)
- sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes)
- sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes)
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes)
- sched: Avoid double preemption in __cond_resched_*lock*() (git-fixes)
- scsi: Revert "scsi: core: map PQ=1, PDT=other values to
SCSI_SCAN_TARGET_PRESENT" (git-fixes).
- scsi: core: Fix a race between scsi_done() and scsi_timeout()
(git-fixes).
- scsi: efct: Fix possible memleak in efct_device_init() (git-fixes).
- scsi: elx: libefc: Fix second parameter type in state callbacks
(git-fixes).
- scsi: fcoe: Fix possible name leak when device_register() fails
(git-fixes).
- scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails
(git-fixes).
- scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes).
- scsi: hpsa: Fix error handling in hpsa_add_sas_host() (git-fixes).
- scsi: hpsa: Fix possible memory leak in hpsa_add_sas_device()
(git-fixes).
- scsi: hpsa: Fix possible memory leak in hpsa_init_one() (git-fixes).
- scsi: ipr: Fix WARNING in ipr_init() (git-fixes).
- scsi: mpi3mr: Refer CONFIG_SCSI_MPI3MR in Makefile (git-fixes).
- scsi: mpt3sas: Fix possible resource leaks in
mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes).
- scsi: scsi_debug: Fix a warning in resp_report_zones() (git-fixes).
- scsi: scsi_debug: Fix a warning in resp_verify() (git-fixes).
- scsi: scsi_debug: Fix a warning in resp_write_scat() (git-fixes).
- scsi: scsi_debug: Fix possible name leak in sdebug_add_host_helper()
(git-fixes).
- scsi: snic: Fix possible UAF in snic_tgt_create() (git-fixes).
- scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes).
- scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
(bsc#1206006).
- scsi: tracing: Fix compile error in trace_array calls when TRACING is
disabled (git-fixes).
- scsi: ufs: Stop using the clock scaling lock in the error handler
(git-fixes).
- scsi: ufs: core: Enable link lost interrupt (git-fixes).
- sctp: fail if no bound addresses can be used for a given scope
(bsc#1206677).
- selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests: Provide local define of __cpuid_count() (git-fixes).
- serial: 8250_dma: Fix DMA Rx rearm race (git-fixes).
- serial: atmel: fix incorrect baudrate setup (git-fixes).
- serial: pch_uart: Pass correct sg to dma_unmap_sg() (git-fixes).
- sfc: fix potential memleak in __ef100_hard_start_xmit() (git-fixes).
- soc: imx8m: Fix incorrect check for of_clk_get_by_name() (git-fixes).
- spi: spidev: remove debug messages that access spidev->spi without
locking (git-fixes).
- staging: mt7621-dts: change some node hex addresses to lower case
(git-fixes).
- staging: vchiq_arm: fix enum vchiq_status return types (git-fixes).
- swim3: add missing major.h include (git-fixes).
- tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent (git-fixes).
- thermal/core: Remove duplicate information when an error occurs
(git-fixes).
- thunderbolt: Do not call PM runtime functions in tb_retimer_scan()
(git-fixes).
- thunderbolt: Do not report errors if on-board retimers are found
(git-fixes).
- thunderbolt: Use correct function to calculate maximum USB3 link rate
(git-fixes).
- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation.
- tick/sched: Fix non-kernel-doc comment (git-fixes).
- tomoyo: fix broken dependency on *.conf.default (git-fixes).
- tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes).
- tracing/hist: Fix issue of losting command info in error_log (git-fixes).
- tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'
(git-fixes).
- tracing/hist: Fix wrong return value in parse_action_params()
(git-fixes).
- tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes).
- tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro
(git-fixes).
- tracing/probes: Handle system names with hyphens (git-fixes).
- tracing: Add '__rel_loc' using trace event macros (git-fixes).
- tracing: Add DYNAMIC flag for dynamic events (git-fixes).
- tracing: Add trace_event helper macros __string_len() and
__assign_str_len() (git-fixes).
- tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing: Do not use out-of-sync va_list in event printing (git-fixes).
- tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes).
- tracing: Fix a kmemleak false positive in tracing_map (git-fixes).
- tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE
(git-fixes).
- tracing: Fix infinite loop in tracing_read_pipe on overflowed
print_trace_line (git-fixes).
- tracing: Fix issue of missing one synthetic field (git-fixes).
- tracing: Fix mismatched comment in __string_len (git-fixes).
- tracing: Fix possible memory leak in __create_synth_event() error path
(git-fixes).
- tracing: Fix race where histograms can be called before the event
(git-fixes).
- tracing: Fix sleeping function called from invalid context on RT kernel
(git-fixes).
- tracing: Fix tp_printk option related with tp_printk_stop_on_boot
(git-fixes).
- tracing: Fix warning on variable 'struct trace_array' (git-fixes).
- tracing: Have TRACE_DEFINE_ENUM affect trace event types as well
(git-fixes).
- tracing: Have syscall trace events use trace_event_buffer_lock_reserve()
(git-fixes).
- tracing: Have type enum modifications copy the strings (git-fixes).
- tracing: Make tp_printk work on syscall tracepoints (git-fixes).
- tracing: Use alignof__(struct {type b;}) instead of offsetof()
(git-fixes).
- tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate
(git-fixes).
- tty: fix possible null-ptr-defer in spk_ttyio_release (git-fixes).
- tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer
(git-fixes).
- usb-storage: apply IGNORE_UAS only for HIKSEMI MD202 on RTL9210
(git-fixes).
- usb: acpi: add helper to check port lpm capability using acpi _DSM
(git-fixes).
- usb: cdns3: remove fetched trb from cache before dequeuing (git-fixes).
- usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes).
- usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes).
- usb: fotg210-udc: Fix ages old endianness issues (git-fixes).
- usb: gadget: f_fs: Ensure ep0req is dequeued before free_request
(git-fixes).
- usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait
(git-fixes).
- usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait (git-fixes).
- usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes).
- usb: gadget: f_hid: fix refcount leak on error path (git-fixes).
- usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
(git-fixes).
- usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints
(git-fixes).
- usb: gadget: g_webcam: Send color matching descriptor per frame
(git-fixes).
- usb: gadget: udc: core: Print error code in usb_gadget_probe_driver()
(git-fixes).
- usb: gadget: udc: core: Revise comments for USB ep enable/disable
(git-fixes).
- usb: gadget: udc: core: Use pr_fmt() to prefix messages (git-fixes).
- usb: gadget: udc: core: remove usage of list iterator past the loop body
(git-fixes).
- usb: host: ehci-fsl: Fix module alias (git-fixes).
- usb: typec: altmodes/displayport: Add pin assignment helper (git-fixes).
- usb: typec: altmodes/displayport: Fix pin assignment calculation
(git-fixes).
- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail
(git-fixes).
- usb: xhci: Check endpoint is valid before dereferencing it (git-fixes).
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid
UAF (git-fixes).
- vfs: make sync_filesystem return errors from ->sync_fs (git-fixes).
- virtio-blk: modify the value type of num in virtio_queue_rq()
(git-fixes).
- virtio-net: correctly enable callback during start_xmit (git-fixes).
- virtio_pci: modify ENOENT to EINVAL (git-fixes).
- w1: fix WARNING after calling w1_process() (git-fixes).
- w1: fix deadloop in __w1_remove_master_device() (git-fixes).
- wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes)
- watchdog: diag288_wdt: do not use stack buffers for hardware data
(bsc#1207497).
- watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497).
- wifi: brcmfmac: fix regression for Broadcom PCIe wifi devices
(git-fixes).
- wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes).
- wifi: mt76: mt7921: add mt7921_mutex_acquire at
mt7921_sta_set_decap_offload (git-fixes).
- wifi: mt76: mt7921e: fix race issue between reset and suspend/resume
(git-fixes).
- wifi: mt76: sdio: fix the deadlock caused by sdio->stat_work (git-fixes).
- wifi: mt76: sdio: poll sta stat when device transmits data (git-fixes).
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid (git-fixes).
- x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
(git-fixes).
- x86/hyperv: Restore VP assist page after cpu offlining/onlining
(git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init()
(git-fixes).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: xfstest fails with error missing kernel patch (git-fixes
bsc#1207501 ltc#201370).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- zram: Delete patch for regression addressed (bsc#1207933).
- zram: do not lookup algorithm in backends table (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-433=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-433=1
- SUSE Linux Enterprise Workstation Extension 15-SP4:
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-433=1
- SUSE Linux Enterprise Module for Live Patching 15-SP4:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-433=1
Please note that this is the initial kernel livepatch without fixes
itself, this livepatch package is later updated by seperate standalone
livepatch updates.
- SUSE Linux Enterprise Module for Legacy Software 15-SP4:
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2023-433=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-433=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-433=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2023-433=1
- SUSE Linux Enterprise High Availability 15-SP4:
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2023-433=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
kernel-default-5.14.21-150400.24.46.1
kernel-default-base-5.14.21-150400.24.46.1.150400.24.17.3
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
cluster-md-kmp-default-5.14.21-150400.24.46.1
cluster-md-kmp-default-debuginfo-5.14.21-150400.24.46.1
dlm-kmp-default-5.14.21-150400.24.46.1
dlm-kmp-default-debuginfo-5.14.21-150400.24.46.1
gfs2-kmp-default-5.14.21-150400.24.46.1
gfs2-kmp-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-5.14.21-150400.24.46.1
kernel-default-base-5.14.21-150400.24.46.1.150400.24.17.3
kernel-default-base-rebuild-5.14.21-150400.24.46.1.150400.24.17.3
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
kernel-default-devel-5.14.21-150400.24.46.1
kernel-default-devel-debuginfo-5.14.21-150400.24.46.1
kernel-default-extra-5.14.21-150400.24.46.1
kernel-default-extra-debuginfo-5.14.21-150400.24.46.1
kernel-default-livepatch-5.14.21-150400.24.46.1
kernel-default-livepatch-devel-5.14.21-150400.24.46.1
kernel-default-optional-5.14.21-150400.24.46.1
kernel-default-optional-debuginfo-5.14.21-150400.24.46.1
kernel-obs-build-5.14.21-150400.24.46.1
kernel-obs-build-debugsource-5.14.21-150400.24.46.1
kernel-obs-qa-5.14.21-150400.24.46.1
kernel-syms-5.14.21-150400.24.46.1
kselftests-kmp-default-5.14.21-150400.24.46.1
kselftests-kmp-default-debuginfo-5.14.21-150400.24.46.1
ocfs2-kmp-default-5.14.21-150400.24.46.1
ocfs2-kmp-default-debuginfo-5.14.21-150400.24.46.1
reiserfs-kmp-default-5.14.21-150400.24.46.1
reiserfs-kmp-default-debuginfo-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (aarch64 ppc64le x86_64):
kernel-kvmsmall-5.14.21-150400.24.46.1
kernel-kvmsmall-debuginfo-5.14.21-150400.24.46.1
kernel-kvmsmall-debugsource-5.14.21-150400.24.46.1
kernel-kvmsmall-devel-5.14.21-150400.24.46.1
kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.46.1
kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (ppc64le x86_64):
kernel-debug-5.14.21-150400.24.46.1
kernel-debug-debuginfo-5.14.21-150400.24.46.1
kernel-debug-debugsource-5.14.21-150400.24.46.1
kernel-debug-devel-5.14.21-150400.24.46.1
kernel-debug-devel-debuginfo-5.14.21-150400.24.46.1
kernel-debug-livepatch-devel-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (aarch64):
cluster-md-kmp-64kb-5.14.21-150400.24.46.1
cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
dlm-kmp-64kb-5.14.21-150400.24.46.1
dlm-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
dtb-allwinner-5.14.21-150400.24.46.1
dtb-altera-5.14.21-150400.24.46.1
dtb-amazon-5.14.21-150400.24.46.1
dtb-amd-5.14.21-150400.24.46.1
dtb-amlogic-5.14.21-150400.24.46.1
dtb-apm-5.14.21-150400.24.46.1
dtb-apple-5.14.21-150400.24.46.1
dtb-arm-5.14.21-150400.24.46.1
dtb-broadcom-5.14.21-150400.24.46.1
dtb-cavium-5.14.21-150400.24.46.1
dtb-exynos-5.14.21-150400.24.46.1
dtb-freescale-5.14.21-150400.24.46.1
dtb-hisilicon-5.14.21-150400.24.46.1
dtb-lg-5.14.21-150400.24.46.1
dtb-marvell-5.14.21-150400.24.46.1
dtb-mediatek-5.14.21-150400.24.46.1
dtb-nvidia-5.14.21-150400.24.46.1
dtb-qcom-5.14.21-150400.24.46.1
dtb-renesas-5.14.21-150400.24.46.1
dtb-rockchip-5.14.21-150400.24.46.1
dtb-socionext-5.14.21-150400.24.46.1
dtb-sprd-5.14.21-150400.24.46.1
dtb-xilinx-5.14.21-150400.24.46.1
gfs2-kmp-64kb-5.14.21-150400.24.46.1
gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
kernel-64kb-5.14.21-150400.24.46.1
kernel-64kb-debuginfo-5.14.21-150400.24.46.1
kernel-64kb-debugsource-5.14.21-150400.24.46.1
kernel-64kb-devel-5.14.21-150400.24.46.1
kernel-64kb-devel-debuginfo-5.14.21-150400.24.46.1
kernel-64kb-extra-5.14.21-150400.24.46.1
kernel-64kb-extra-debuginfo-5.14.21-150400.24.46.1
kernel-64kb-livepatch-devel-5.14.21-150400.24.46.1
kernel-64kb-optional-5.14.21-150400.24.46.1
kernel-64kb-optional-debuginfo-5.14.21-150400.24.46.1
kselftests-kmp-64kb-5.14.21-150400.24.46.1
kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
ocfs2-kmp-64kb-5.14.21-150400.24.46.1
ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
reiserfs-kmp-64kb-5.14.21-150400.24.46.1
reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (noarch):
kernel-devel-5.14.21-150400.24.46.1
kernel-docs-5.14.21-150400.24.46.2
kernel-docs-html-5.14.21-150400.24.46.2
kernel-macros-5.14.21-150400.24.46.1
kernel-source-5.14.21-150400.24.46.1
kernel-source-vanilla-5.14.21-150400.24.46.1
- openSUSE Leap 15.4 (s390x):
kernel-zfcpdump-5.14.21-150400.24.46.1
kernel-zfcpdump-debuginfo-5.14.21-150400.24.46.1
kernel-zfcpdump-debugsource-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Workstation Extension 15-SP4 (x86_64):
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
kernel-default-extra-5.14.21-150400.24.46.1
kernel-default-extra-debuginfo-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Live Patching 15-SP4 (ppc64le s390x x86_64):
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
kernel-default-livepatch-5.14.21-150400.24.46.1
kernel-default-livepatch-devel-5.14.21-150400.24.46.1
kernel-livepatch-5_14_21-150400_24_46-default-1-150400.9.3.3
kernel-livepatch-5_14_21-150400_24_46-default-debuginfo-1-150400.9.3.3
kernel-livepatch-SLE15-SP4_Update_8-debugsource-1-150400.9.3.3
- SUSE Linux Enterprise Module for Legacy Software 15-SP4 (aarch64 ppc64le s390x x86_64):
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
reiserfs-kmp-default-5.14.21-150400.24.46.1
reiserfs-kmp-default-debuginfo-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-5.14.21-150400.24.46.1
kernel-obs-build-debugsource-5.14.21-150400.24.46.1
kernel-syms-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch):
kernel-docs-5.14.21-150400.24.46.2
kernel-source-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
kernel-default-5.14.21-150400.24.46.1
kernel-default-base-5.14.21-150400.24.46.1.150400.24.17.3
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
kernel-default-devel-5.14.21-150400.24.46.1
kernel-default-devel-debuginfo-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64):
kernel-64kb-5.14.21-150400.24.46.1
kernel-64kb-debuginfo-5.14.21-150400.24.46.1
kernel-64kb-debugsource-5.14.21-150400.24.46.1
kernel-64kb-devel-5.14.21-150400.24.46.1
kernel-64kb-devel-debuginfo-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
kernel-devel-5.14.21-150400.24.46.1
kernel-macros-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (s390x):
kernel-zfcpdump-5.14.21-150400.24.46.1
kernel-zfcpdump-debuginfo-5.14.21-150400.24.46.1
kernel-zfcpdump-debugsource-5.14.21-150400.24.46.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
kernel-default-5.14.21-150400.24.46.1
kernel-default-base-5.14.21-150400.24.46.1.150400.24.17.3
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
- SUSE Linux Enterprise High Availability 15-SP4 (aarch64 ppc64le s390x x86_64):
cluster-md-kmp-default-5.14.21-150400.24.46.1
cluster-md-kmp-default-debuginfo-5.14.21-150400.24.46.1
dlm-kmp-default-5.14.21-150400.24.46.1
dlm-kmp-default-debuginfo-5.14.21-150400.24.46.1
gfs2-kmp-default-5.14.21-150400.24.46.1
gfs2-kmp-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debuginfo-5.14.21-150400.24.46.1
kernel-default-debugsource-5.14.21-150400.24.46.1
ocfs2-kmp-default-5.14.21-150400.24.46.1
ocfs2-kmp-default-debuginfo-5.14.21-150400.24.46.1
References:
https://www.suse.com/security/cve/CVE-2020-24588.html
https://www.suse.com/security/cve/CVE-2022-4382.html
https://www.suse.com/security/cve/CVE-2022-47929.html
https://www.suse.com/security/cve/CVE-2023-0122.html
https://www.suse.com/security/cve/CVE-2023-0179.html
https://www.suse.com/security/cve/CVE-2023-0266.html
https://www.suse.com/security/cve/CVE-2023-0590.html
https://www.suse.com/security/cve/CVE-2023-23454.html
https://www.suse.com/security/cve/CVE-2023-23455.html
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1185861
https://bugzilla.suse.com/1185863
https://bugzilla.suse.com/1186449
https://bugzilla.suse.com/1191256
https://bugzilla.suse.com/1192868
https://bugzilla.suse.com/1193629
https://bugzilla.suse.com/1194869
https://bugzilla.suse.com/1195175
https://bugzilla.suse.com/1195655
https://bugzilla.suse.com/1196058
https://bugzilla.suse.com/1199701
https://bugzilla.suse.com/1204063
https://bugzilla.suse.com/1204356
https://bugzilla.suse.com/1204662
https://bugzilla.suse.com/1205495
https://bugzilla.suse.com/1206006
https://bugzilla.suse.com/1206036
https://bugzilla.suse.com/1206056
https://bugzilla.suse.com/1206057
https://bugzilla.suse.com/1206258
https://bugzilla.suse.com/1206363
https://bugzilla.suse.com/1206459
https://bugzilla.suse.com/1206616
https://bugzilla.suse.com/1206677
https://bugzilla.suse.com/1206784
https://bugzilla.suse.com/1207010
https://bugzilla.suse.com/1207034
https://bugzilla.suse.com/1207036
https://bugzilla.suse.com/1207050
https://bugzilla.suse.com/1207125
https://bugzilla.suse.com/1207134
https://bugzilla.suse.com/1207149
https://bugzilla.suse.com/1207158
https://bugzilla.suse.com/1207184
https://bugzilla.suse.com/1207186
https://bugzilla.suse.com/1207190
https://bugzilla.suse.com/1207237
https://bugzilla.suse.com/1207263
https://bugzilla.suse.com/1207269
https://bugzilla.suse.com/1207497
https://bugzilla.suse.com/1207500
https://bugzilla.suse.com/1207501
https://bugzilla.suse.com/1207506
https://bugzilla.suse.com/1207507
https://bugzilla.suse.com/1207734
https://bugzilla.suse.com/1207769
https://bugzilla.suse.com/1207795
https://bugzilla.suse.com/1207842
https://bugzilla.suse.com/1207878
https://bugzilla.suse.com/1207933
1
0
SUSE-SU-2023:0431-1: important: Security update for apache2-mod_security2
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for apache2-mod_security2
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0431-1
Rating: important
References: #1207379
Cross-References: CVE-2023-24021
CVSS scores:
CVE-2023-24021 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-24021 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for apache2-mod_security2 fixes the following issues:
- CVE-2023-24021: Fixed FILES_TMP_CONTENT missing complete content
(bsc#1207379).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-431=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-431=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
apache2-mod_security2-2.9.4-150400.3.6.1
apache2-mod_security2-debuginfo-2.9.4-150400.3.6.1
apache2-mod_security2-debugsource-2.9.4-150400.3.6.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-mod_security2-2.9.4-150400.3.6.1
apache2-mod_security2-debuginfo-2.9.4-150400.3.6.1
apache2-mod_security2-debugsource-2.9.4-150400.3.6.1
References:
https://www.suse.com/security/cve/CVE-2023-24021.html
https://bugzilla.suse.com/1207379
1
0
SUSE-SU-2023:0429-1: important: Security update for curl
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0429-1
Rating: important
References: #1207990 #1207991 #1207992
Cross-References: CVE-2023-23914 CVE-2023-23915 CVE-2023-23916
CVSS scores:
CVE-2023-23914 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2023-23915 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2023-23916 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for curl fixes the following issues:
- CVE-2023-23914: Fixed HSTS ignored on multiple requests (bsc#1207990).
- CVE-2023-23915: Fixed HSTS amnesia with --parallel (bsc#1207991).
- CVE-2023-23916: Fixed HTTP multi-header compression denial of service
(bsc#1207992).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-429=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-429=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-429=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2023-429=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
curl-7.79.1-150400.5.15.1
curl-debuginfo-7.79.1-150400.5.15.1
curl-debugsource-7.79.1-150400.5.15.1
libcurl4-7.79.1-150400.5.15.1
libcurl4-debuginfo-7.79.1-150400.5.15.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
curl-7.79.1-150400.5.15.1
curl-debuginfo-7.79.1-150400.5.15.1
curl-debugsource-7.79.1-150400.5.15.1
libcurl-devel-7.79.1-150400.5.15.1
libcurl4-7.79.1-150400.5.15.1
libcurl4-debuginfo-7.79.1-150400.5.15.1
- openSUSE Leap 15.4 (x86_64):
libcurl-devel-32bit-7.79.1-150400.5.15.1
libcurl4-32bit-7.79.1-150400.5.15.1
libcurl4-32bit-debuginfo-7.79.1-150400.5.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
curl-7.79.1-150400.5.15.1
curl-debuginfo-7.79.1-150400.5.15.1
curl-debugsource-7.79.1-150400.5.15.1
libcurl-devel-7.79.1-150400.5.15.1
libcurl4-7.79.1-150400.5.15.1
libcurl4-debuginfo-7.79.1-150400.5.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libcurl4-32bit-7.79.1-150400.5.15.1
libcurl4-32bit-debuginfo-7.79.1-150400.5.15.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
curl-7.79.1-150400.5.15.1
curl-debuginfo-7.79.1-150400.5.15.1
curl-debugsource-7.79.1-150400.5.15.1
libcurl4-7.79.1-150400.5.15.1
libcurl4-debuginfo-7.79.1-150400.5.15.1
References:
https://www.suse.com/security/cve/CVE-2023-23914.html
https://www.suse.com/security/cve/CVE-2023-23915.html
https://www.suse.com/security/cve/CVE-2023-23916.html
https://bugzilla.suse.com/1207990
https://bugzilla.suse.com/1207991
https://bugzilla.suse.com/1207992
1
0
SUSE-SU-2023:0423-1: moderate: Security update for aws-efs-utils
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for aws-efs-utils
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0423-1
Rating: moderate
References: #1191055 #1206737
Cross-References: CVE-2022-46174
CVSS scores:
CVE-2022-46174 (NVD) : 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
CVE-2022-46174 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP1
SUSE Linux Enterprise High Performance Computing 15-SP2
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Public Cloud 15-SP1
SUSE Linux Enterprise Module for Public Cloud 15-SP2
SUSE Linux Enterprise Module for Public Cloud 15-SP3
SUSE Linux Enterprise Module for Public Cloud 15-SP4
SUSE Linux Enterprise Server 15-SP1
SUSE Linux Enterprise Server 15-SP2
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP1
SUSE Linux Enterprise Server for SAP Applications 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.0
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.0
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.0
SUSE Manager Server 4.1
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for aws-efs-utils fixes the following issues:
- Updated to version 1.34.5:
- CVE-2022-46174: Fixed a race condition when mounting filesystems using
TLS, which could result in various failures (bsc#1206737).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-423=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-423=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2023-423=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP2:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-423=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP1:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-423=1
Package List:
- openSUSE Leap 15.4 (noarch):
aws-efs-utils-1.34.5-150100.4.11.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4 (noarch):
aws-efs-utils-1.34.5-150100.4.11.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (noarch):
aws-efs-utils-1.34.5-150100.4.11.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP2 (noarch):
aws-efs-utils-1.34.5-150100.4.11.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP1 (noarch):
aws-efs-utils-1.34.5-150100.4.11.1
References:
https://www.suse.com/security/cve/CVE-2022-46174.html
https://bugzilla.suse.com/1191055
https://bugzilla.suse.com/1206737
1
0
SUSE-SU-2023:0427-1: important: Security update for bind
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0427-1
Rating: important
References: #1207471
Cross-References: CVE-2022-3094
CVSS scores:
CVE-2022-3094 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3094 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for bind fixes the following issues:
- CVE-2022-3094: Fixed memory exhaustion due to UPDATE message flooding
(bsc#1207471).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-427=1
- SUSE Manager Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-427=1
- SUSE Manager Retail Branch Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-427=1
- SUSE Manager Proxy 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-427=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-427=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-427=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-427=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-427=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-427=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-427=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-427=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
bind-chrootenv-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Manager Server 4.2 (ppc64le s390x x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Manager Server 4.2 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Manager Retail Branch Server 4.2 (x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Manager Retail Branch Server 4.2 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Manager Proxy 4.2 (x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Manager Proxy 4.2 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
bind-9.16.6-150300.22.27.1
bind-chrootenv-9.16.6-150300.22.27.1
bind-debuginfo-9.16.6-150300.22.27.1
bind-debugsource-9.16.6-150300.22.27.1
bind-devel-9.16.6-150300.22.27.1
bind-utils-9.16.6-150300.22.27.1
bind-utils-debuginfo-9.16.6-150300.22.27.1
libbind9-1600-9.16.6-150300.22.27.1
libbind9-1600-debuginfo-9.16.6-150300.22.27.1
libdns1605-9.16.6-150300.22.27.1
libdns1605-debuginfo-9.16.6-150300.22.27.1
libirs-devel-9.16.6-150300.22.27.1
libirs1601-9.16.6-150300.22.27.1
libirs1601-debuginfo-9.16.6-150300.22.27.1
libisc1606-9.16.6-150300.22.27.1
libisc1606-debuginfo-9.16.6-150300.22.27.1
libisccc1600-9.16.6-150300.22.27.1
libisccc1600-debuginfo-9.16.6-150300.22.27.1
libisccfg1600-9.16.6-150300.22.27.1
libisccfg1600-debuginfo-9.16.6-150300.22.27.1
libns1604-9.16.6-150300.22.27.1
libns1604-debuginfo-9.16.6-150300.22.27.1
- SUSE Enterprise Storage 7.1 (noarch):
bind-doc-9.16.6-150300.22.27.1
python3-bind-9.16.6-150300.22.27.1
References:
https://www.suse.com/security/cve/CVE-2022-3094.html
https://bugzilla.suse.com/1207471
1
0
SUSE-SU-2023:0424-1: important: Security update for ImageMagick
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0424-1
Rating: important
References: #1207982 #1207983
Cross-References: CVE-2022-44267 CVE-2022-44268
CVSS scores:
CVE-2022-44267 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-44267 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-44268 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-44268 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP 15-SP3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2022-44267: Fixed a denial of service when parsing a PNG image
(bsc#1207982).
- CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image
(bsc#1207983).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-424=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-424=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-424=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-424=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-424=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-424=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-424=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-424=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-424=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-424=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2023-424=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
- openSUSE Leap 15.4 (x86_64):
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
ImageMagick-7.0.7.34-150200.10.42.1
ImageMagick-config-7-SUSE-7.0.7.34-150200.10.42.1
ImageMagick-config-7-upstream-7.0.7.34-150200.10.42.1
ImageMagick-debuginfo-7.0.7.34-150200.10.42.1
ImageMagick-debugsource-7.0.7.34-150200.10.42.1
ImageMagick-devel-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.42.1
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.42.1
libMagick++-devel-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.42.1
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.42.1
perl-PerlMagick-7.0.7.34-150200.10.42.1
perl-PerlMagick-debuginfo-7.0.7.34-150200.10.42.1
References:
https://www.suse.com/security/cve/CVE-2022-44267.html
https://www.suse.com/security/cve/CVE-2022-44268.html
https://bugzilla.suse.com/1207982
https://bugzilla.suse.com/1207983
1
0
SUSE-SU-2023:0428-1: important: Security update for ImageMagick
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0428-1
Rating: important
References: #1207982 #1207983
Cross-References: CVE-2022-44267 CVE-2022-44268
CVSS scores:
CVE-2022-44267 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-44267 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-44268 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-44268 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2022-44267: Fixed a denial of service when parsing a PNG image
(bsc#1207982).
- CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image
(bsc#1207983).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-428=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-428=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-428=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.1.0.9-150400.6.12.1
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.12.1
ImageMagick-config-7-upstream-7.1.0.9-150400.6.12.1
ImageMagick-debuginfo-7.1.0.9-150400.6.12.1
ImageMagick-debugsource-7.1.0.9-150400.6.12.1
ImageMagick-devel-7.1.0.9-150400.6.12.1
ImageMagick-extra-7.1.0.9-150400.6.12.1
ImageMagick-extra-debuginfo-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.12.1
libMagick++-devel-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.12.1
perl-PerlMagick-7.1.0.9-150400.6.12.1
perl-PerlMagick-debuginfo-7.1.0.9-150400.6.12.1
- openSUSE Leap 15.4 (x86_64):
ImageMagick-devel-32bit-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.12.1
libMagick++-devel-32bit-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.12.1
- openSUSE Leap 15.4 (noarch):
ImageMagick-doc-7.1.0.9-150400.6.12.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-7.1.0.9-150400.6.12.1
ImageMagick-debugsource-7.1.0.9-150400.6.12.1
perl-PerlMagick-7.1.0.9-150400.6.12.1
perl-PerlMagick-debuginfo-7.1.0.9-150400.6.12.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.1.0.9-150400.6.12.1
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.12.1
ImageMagick-config-7-upstream-7.1.0.9-150400.6.12.1
ImageMagick-debuginfo-7.1.0.9-150400.6.12.1
ImageMagick-debugsource-7.1.0.9-150400.6.12.1
ImageMagick-devel-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.12.1
libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.12.1
libMagick++-devel-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.12.1
libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.12.1
libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.12.1
References:
https://www.suse.com/security/cve/CVE-2022-44267.html
https://www.suse.com/security/cve/CVE-2022-44268.html
https://bugzilla.suse.com/1207982
https://bugzilla.suse.com/1207983
1
0
SUSE-SU-2023:0430-1: important: Security update for git
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for git
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0430-1
Rating: important
References: #1208027 #1208028
Cross-References: CVE-2023-22490 CVE-2023-23946
CVSS scores:
CVE-2023-22490 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2023-22490 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
CVE-2023-23946 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2023-23946 (SUSE): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP3-LTSS
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for git fixes the following issues:
- CVE-2023-22490: Fixed incorrectly usable local clone optimization even
when using a non-local transport (bsc#1208027).
- CVE-2023-23946: Fixed issue where a path outside the working tree can
be overwritten as the user who is running "git apply" (bsc#1208028).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-430=1
- SUSE Manager Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-430=1
- SUSE Manager Retail Branch Server 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-430=1
- SUSE Manager Proxy 4.2:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-430=1
- SUSE Linux Enterprise Server for SAP 15-SP3:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-430=1
- SUSE Linux Enterprise Server 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-430=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-430=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-430=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-430=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-430=1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-430=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2023-430=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-credential-gnome-keyring-2.35.3-150300.10.24.1
git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.24.1
git-credential-libsecret-2.35.3-150300.10.24.1
git-credential-libsecret-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-p4-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- openSUSE Leap 15.4 (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Manager Server 4.2 (ppc64le s390x x86_64):
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Manager Retail Branch Server 4.2 (x86_64):
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Manager Proxy 4.2 (x86_64):
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (ppc64le x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Server for SAP 15-SP3 (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (aarch64 ppc64le s390x x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Server 15-SP3-LTSS (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (aarch64 x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (aarch64 x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (noarch):
git-doc-2.35.3-150300.10.24.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
git-2.35.3-150300.10.24.1
git-arch-2.35.3-150300.10.24.1
git-core-2.35.3-150300.10.24.1
git-core-debuginfo-2.35.3-150300.10.24.1
git-cvs-2.35.3-150300.10.24.1
git-daemon-2.35.3-150300.10.24.1
git-daemon-debuginfo-2.35.3-150300.10.24.1
git-debuginfo-2.35.3-150300.10.24.1
git-debugsource-2.35.3-150300.10.24.1
git-email-2.35.3-150300.10.24.1
git-gui-2.35.3-150300.10.24.1
git-svn-2.35.3-150300.10.24.1
git-web-2.35.3-150300.10.24.1
gitk-2.35.3-150300.10.24.1
perl-Git-2.35.3-150300.10.24.1
- SUSE Enterprise Storage 7.1 (noarch):
git-doc-2.35.3-150300.10.24.1
References:
https://www.suse.com/security/cve/CVE-2023-22490.html
https://www.suse.com/security/cve/CVE-2023-23946.html
https://bugzilla.suse.com/1208027
https://bugzilla.suse.com/1208028
1
0
openSUSE-SU-2023:0047-1: important: Security update for phpMyAdmin
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
openSUSE Security Update: Security update for phpMyAdmin
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0047-1
Rating: important
References: #1195017 #1195018 #1197036 #1208186
Cross-References: CVE-2022-0813 CVE-2022-23807 CVE-2022-23808
CVE-2023-25727
CVSS scores:
CVE-2022-0813 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-0813 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-23807 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2022-23808 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for phpMyAdmin fixes the following issues:
phpMyAdmin was updated to 5.2.1
This is a security and bufix release.
* Security:
- Fix (PMASA-2023-01, CWE-661, boo#1208186, CVE-2023-25727) Fix an XSS
attack through the drag-and-drop upload feature.
* Bugfixes:
- issue #17522 Fix case where the routes cache file is invalid
- issue #17506 Fix error when configuring 2FA without XMLWriter or
Imagick
- issue Fix blank page when some error occurs
- issue #17519 Fix Export pages not working in certain conditions
- issue #17496 Fix error in table operation page when partitions are
broken
- issue #17386 Fix system memory and system swap values on Windows
- issue #17517 Fix Database Server panel not getting hidden by
ShowServerInfo configuration directive
- issue #17271 Fix database names not showing on Processes tab
- issue #17424 Fix export limit size calculation
- issue #17366 Fix refresh rate popup on Monitor page
- issue #17577 Fix monitor charts size on RTL languages
- issue #17121 Fix password_hash function incorrectly adding single
quotes to password before hashing
- issue #17586 Fix statistics not showing for empty databases
- issue #17592 Clicking on the New index link on the sidebar does not
throw an error anymore
- issue #17584 It's now possible to browse a database that includes two
% in its name
- issue Fix PHP 8.2 deprecated string interpolation syntax
- issue Some languages are now correctly detected from the HTTP
header
- issue #17617 Sorting is correctly remembered when
$cfg['RememberSorting'] is true
- issue #17593 Table filtering now works when action buttons are on the
right side of the row
- issue #17388 Find and Replace using regex now makes a valid query if
no matching result set found
- issue #17551 Enum/Set editor will not fail to open when creating a new
column
- issue #17659 Fix error when a database group is named tables, views,
functions, procedures or events
- issue #17673 Allow empty values to be inserted into columns
- issue #17620 Fix error handling at phpMyAdmin startup for the JS SQL
console
- issue Fixed debug queries console broken UI for query time and
group count
- issue Fixed escaping of SQL query and errors for the debug
console
- issue Fix console toolbar UI when the bookmark feature is
disabled and sql debug is enabled
- issue #17543 Fix JS error on saving a new designer page
- issue #17546 Fix JS error after using save as and open page operation
on the designer
- issue Fix PHP warning on GIS visualization when there is only
one GIS column
- issue #17728 Some select HTML tags will now have the correct UI style
- issue #17734 PHP deprecations will only be shown when in a development
environment
- issue #17369 Fix server error when blowfish_secret is not exactly 32
bytes long
- issue #17736 Add utf8mb3 as an alias of utf8 on the charset
description page
- issue #16418 Fix FAQ 1.44 about manually removing vendor folders
- issue #12359 Setup page now sends the Content-Security-Policy headers
- issue #17747 The Column Visibility Toggle will not be hidden by other
elements
- issue #17756 Edit/Copy/Delete row now works when using GROUP BY
- issue #17248 Support the UUID data type for MariaDB >= 10.7
- issue #17656 Fix replace/change/set table prefix is not working
- issue Fix monitor page filter queries only filtering the first
row
- issue Fix "Link not found!" on foreign columns for tables
having no char column to show
- issue #17390 Fix "Create view" modal doesn't show on results and empty
results
- issue #17772 Fix wrong styles for add button from central columns
- issue #17389 Fix HTML disappears when exporting settings to browser's
storage
- issue #17166 Fix "Warning: #1287 'X' is deprecated [...] Please use
ST_X instead." on search page
- issue Use jquery-migrate.min.js (14KB) instead of
jquery-migrate.min.js (31KB)
- issue #17842 Use jquery.validate.min.js (24 KB) instead of
jquery.validate.js (50 KB)
- issue #17281 Fix links to databases for information_schema.SCHEMATA
- issue #17553 Fix Metro theme unreadable links above navigation tree
- issue #17553 Metro theme UI fixes and improvements
- issue #17553 Fix Metro theme login form with
- issue #16042 Exported gzip file of database has first ~73 kB
uncompressed and rest is gzip compressed in Firefox
- issue #17705 Fix inline SQL query edit FK checkbox preventing submit
buttons from working
- issue #17777 Fix Uncaught TypeError: Cannot read properties of null
(reading 'inline') on datepickers when re-opened
- issue Fix Original theme buttons style and login form width
- issue #17892 Fix closing index edit modal and reopening causes it to
fire twice
- issue #17606 Fix preview SQL modal not working inside "Add Index" modal
- issue Fix PHP error on adding new column on create table form
- issue #17482 Default to "Full texts" when running explain statements
- issue Fixed Chrome scrolling performance issue on a textarea of
an "export as text" page
- issue #17703 Fix datepicker appears on all fields, not just date
- issue Fix space in the tree line when a DB is expanded
- issue #17340 Fix "New Table" page -> "VIRTUAL" attribute is lost when
adding a new column
- issue #17446 Fix missing option for STORED virtual column on MySQL and
PERSISTENT is not supported on MySQL
- issue #17446 Lower the check for virtual columns to MySQL>=5.7.6
nothing is supported on 5.7.5
- issue Fix column names option for CSV Export
- issue #17177 Fix preview SQL when reordering columns doesn't work on
move columns
- issue #15887 Fixed DROP TABLE errors ignored on multi table select for
DROP
- issue #17944 Fix unable to create a view from tree view button
- issue #17927 Fix key navigation between select inputs (drop an old
Firefox workaround)
- issue #17967 Fix missing icon for collapse all button
- issue #18006 Fixed UUID columns can't be moved
- issue Add `spellcheck="false"` to all password fields and some
text fields to avoid spell-jacking data leaks
- issue Remove non working "Analyze Explain at MariaDB.org"
button (MariaDB stopped this service)
- issue #17229 Add support for Web Authentication API because Chrome
removed support for the U2F API
- issue #18019 Fix "Call to a member function fetchAssoc() on bool" with
SQL mode ONLY_FULL_GROUP_BY on monitor search logs
- issue Add back UUID and UUID_SHORT to functions on MySQL and
all MariaDB versions
- issue #17398 Fix clicking on JSON columns triggers update query
- issue Fix silent JSON parse error on upload progress
- issue #17833 Fix "Add Parameter" button not working for Add Routine
Screen
- issue #17365 Fixed "Uncaught Error: regexp too big" on server status
variables page
Update to 5.2.0
* Bugfix
- issue #16521 Upgrade Bootstrap to version 5
- issue #16521 Drop support for Internet Explorer and others
- issue Upgrade to shapefile 3
- issue #16555 Bump minimum PHP version to 7.2
- issue Remove the phpseclib dependency
- issue Upgrade Symfony components to version 5.2
- issue Upgrade to Motranslator 4
- issue #16005 Improve the performance of the Export logic
- issue #16829 Add NOT LIKE %...% operator to Table search
- issue #16845 Fixed some links not passing through url.php
- issue #16382 Remove apc upload progress method (all upload progress
code was removed from the PHP extension)
- issue #16974 Replace zxcvbn by zxcvbn-ts
- issue #15691 Disable the last column checkbox in the column list
dropdown instead of not allowing un-check
- issue #16138 Ignore the length of integer types and show a warning on
MySQL >= 8.0.18
- issue Add support for the Mroonga engine
- issue Double click column name to directly copy to clipboard
- issue #16425 Add DELETE FROM table on table operations page
- issue #16482 Add a select all link for table-specific privileges
- issue #14276 Add support for account locking
- issue #17143 Use composer/ca-bundle to manage the CA cert file
- issue #17143 Require the openssl PHP extension
- issue #17171 Remove the printview.css file from themes
- issue #17203 Redesign the export and the import pages
- issue #16197 Replace the master/slave terminology
- issue #17257 Replace libraries/vendor_config.php constants with an
array
- issue Add the Bootstrap theme
- issue #17499 Remove stickyfilljs JavaScript dependency
Update to 5.1.3
This is a security and bufix release.
* Security
- Fix for boo#1197036 (CVE-2022-0813)
- Fix for path disclosure under certain server configurations (if
display_errors is on, for instance)
* Bugfix
- issue #17308 Fix broken pagination links in the navigation sidebar
- issue #17331 Fix MariaDB has no support for system variable
"disabled_storage_engines"
- issue #17315 Fix unsupported operand types in Results.php when running
"SHOW PROCESSLIST" SQL query
- issue #17288 Fixed importing browser settings question box after login
when having no pmadb
- issue #17288 Fix "First day of calendar" user override has no effect
- issue #17239 Fixed repeating headers are not working
- issue #17298 Fixed import of email-adresses or links from ODS results
in empty contents
- issue #17344 Fixed a type error on ODS import with non string values
- issue #17239 Fixed header row show/hide columns buttons on each line
after hover are shown on each row
Update to 5.1.2
This is a security and bufix release.
* Security
- Fix boo#1195017 (CVE-2022-23807, PMASA-2022-1, CWE-661) Two factor
authentication bypass
- Fix boo#1195018 (CVE-2022-23808, PMASA-2022-2, CWE-661) Multiple XSS
and HTML injection attacks in setup script
* Bugfixes
- Revert a changed to $cfg['CharTextareaRows'] allow values less than 7
- Fix encoding of enum and set values on edit value
- Fixed possible "Undefined index: clause_is_unique" error
- Fixed some situations where a user is logged out when working with
more than one server
- Fixed a problem with assigning privileges to a user using the
multiselect list when the database name has an underscore
- Enable cookie parameter "SameSite" when the PHP version is 7.3 or newer
- Correctly handle the removal of "innodb_file_format" in MariaDB and
MySQL
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-47=1
Package List:
- openSUSE Backports SLE-15-SP4 (noarch):
phpMyAdmin-5.2.1-bp154.2.3.1
phpMyAdmin-apache-5.2.1-bp154.2.3.1
phpMyAdmin-lang-5.2.1-bp154.2.3.1
References:
https://www.suse.com/security/cve/CVE-2022-0813.html
https://www.suse.com/security/cve/CVE-2022-23807.html
https://www.suse.com/security/cve/CVE-2022-23808.html
https://www.suse.com/security/cve/CVE-2023-25727.html
https://bugzilla.suse.com/1195017
https://bugzilla.suse.com/1195018
https://bugzilla.suse.com/1197036
https://bugzilla.suse.com/1208186
1
0
SUSE-SU-2023:0418-1: important: Security update for git
by opensuse-security@opensuse.org 15 Feb '23
by opensuse-security@opensuse.org 15 Feb '23
15 Feb '23
SUSE Security Update: Security update for git
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0418-1
Rating: important
References: #1204455 #1204456 #1208027 #1208028
Cross-References: CVE-2022-39253 CVE-2022-39260 CVE-2023-22490
CVE-2023-23946
CVSS scores:
CVE-2022-39253 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-39253 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-39260 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-39260 (SUSE): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2023-22490 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2023-22490 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
CVE-2023-23946 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2023-23946 (SUSE): 5 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for git fixes the following issues:
- CVE-2023-22490: Fixed incorrectly usable local clone optimization even
when using a non-local transport (bsc#1208027).
- CVE-2023-23946: Fixed issue where a path outside the working tree can
be overwritten as the user who is running "git apply" (bsc#1208028).
- CVE-2022-39260: Fixed overflow in `split_cmdline()`, leading to
arbitrary heap writes and remote code execution (bsc#1204456).
- CVE-2022-39253: Fixed dereference issue with symbolic links via the
`--local` clone mechanism (bsc#1204455).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-418=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-418=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-418=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-418=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-418=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-418=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-418=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2023-418=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
git-svn-debuginfo-2.26.2-150000.47.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
git-doc-2.26.2-150000.47.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE Enterprise Storage 7 (noarch):
git-doc-2.26.2-150000.47.1
- SUSE CaaS Platform 4.0 (x86_64):
git-2.26.2-150000.47.1
git-arch-2.26.2-150000.47.1
git-core-2.26.2-150000.47.1
git-core-debuginfo-2.26.2-150000.47.1
git-cvs-2.26.2-150000.47.1
git-daemon-2.26.2-150000.47.1
git-daemon-debuginfo-2.26.2-150000.47.1
git-debuginfo-2.26.2-150000.47.1
git-debugsource-2.26.2-150000.47.1
git-email-2.26.2-150000.47.1
git-gui-2.26.2-150000.47.1
git-svn-2.26.2-150000.47.1
git-svn-debuginfo-2.26.2-150000.47.1
git-web-2.26.2-150000.47.1
gitk-2.26.2-150000.47.1
- SUSE CaaS Platform 4.0 (noarch):
git-doc-2.26.2-150000.47.1
References:
https://www.suse.com/security/cve/CVE-2022-39253.html
https://www.suse.com/security/cve/CVE-2022-39260.html
https://www.suse.com/security/cve/CVE-2023-22490.html
https://www.suse.com/security/cve/CVE-2023-23946.html
https://bugzilla.suse.com/1204455
https://bugzilla.suse.com/1204456
https://bugzilla.suse.com/1208027
https://bugzilla.suse.com/1208028
1
0