openSUSE Security Announce
Threads by month
- ----- 2024 -----
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
September 2023
- 2 participants
- 127 discussions
SUSE-SU-2023:3561-1: important: Security update for skopeo
by security@lists.opensuse.org 08 Sep '23
by security@lists.opensuse.org 08 Sep '23
08 Sep '23
# Security update for skopeo
Announcement ID: SUSE-SU-2023:3561-1
Rating: important
References:
* #1212475
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of skopeo fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3561=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3561=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3561=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3561=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3561=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3561=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3561=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3561=1
* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3561=1
* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-3561=1
* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3561=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3561=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Manager Proxy 4.2 (x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Manager Retail Branch Server 4.2 (x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Manager Server 4.2 (ppc64le s390x x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* skopeo-debuginfo-1.12.0-150300.11.5.1
* skopeo-1.12.0-150300.11.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0
SUSE-SU-2023:3563-1: moderate: Security update for icu73_2
by security@lists.opensuse.org 08 Sep '23
by security@lists.opensuse.org 08 Sep '23
08 Sep '23
# Security update for icu73_2
Announcement ID: SUSE-SU-2023:3563-1
Rating: moderate
References:
* #1030253
* #1095425
* #1103893
* #1112183
* #1146907
* #1158955
* #1159131
* #1161007
* #1162882
* #1166844
* #1167603
* #1182252
* #1182645
* #1192935
* #1193951
* #354372
* #437293
* #824262
* PED-4917
* SLE-11118
Cross-References:
* CVE-2020-10531
* CVE-2020-21913
CVSS scores:
* CVE-2020-10531 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-10531 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2020-21913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that solves two vulnerabilities, contains two features and has 16
security fixes can now be installed.
## Description:
This update for icu73_2 fixes the following issues:
* Update to release 73.2
* CLDR extends the support for “short” Chinese sort orders to cover some
additional, required characters for Level 2. This is carried over into ICU
collation.
* ICU has a modified character conversion table, mapping some GB18030
characters to Unicode characters that were encoded after GB18030-2005.
* fixes builds where UCHAR_TYPE is re-defined such as libqt5-qtwebengine
* Update to release 73.1
* Improved Japanese and Korean short-text line breaking
* Reduction of C++ memory use in date formatting
* Update to release 72.1
* Support for Unicode 15, including new characters, scripts, emoji, and
corresponding API constants.
* Support for CLDR 42 locale data with various additions and corrections.
* Shift to tzdb 2022e. Pre-1970 data for a number of timezones has been
removed.
* bump library packagename to libicu71 to match the version.
* update to 71.1:
* updates to CLDR 41 locale data with various additions and corrections.
* phrase-based line breaking for Japanese. Existing line breaking methods
follow standards and conventions for body text but do not work well for
short Japanese text, such as in titles and headings. This new feature is
optimized for these use cases.
* support for Hindi written in Latin letters (hi_Latn). The CLDR data for this
increasingly popular locale has been significantly revised and expanded.
Note that based on user expectations, hi_Latn incorporates a large amount of
English, and can also be referred to as “Hinglish”.
* time zone data updated to version 2022a. Note that pre-1970 data for a
number of time zones has been removed, as has been the case in the upstream
tzdata release since 2021b.
* ICU-21793 Fix ucptrietest golden diff [bsc#1192935]
* Update to release 70.1:
* Unicode 14 (new characters, scripts, emoji, and API constants)
* CLDR 40 (many additions and corrections)
* Fixes for measurement unit formatting
* Can now be built with up to C++20 compilers
* ICU-21613 Fix undefined behaviour in ComplexUnitsConverter::applyRounder
* Update to release 69.1
* CLDR 39
* For Norwegian, "no" is back to being the canonical code, with "nb" treated
as equivalent. This aligns handling of Norwegian with other macro language
codes.
* Binary prefixes in measurement units (KiB, MiB, etc.)
* Time zone offsets from local time: New APIs
BasicTimeZone::getOffsetFromLocal() (C++) and
ucal_getTimeZoneOffsetFromLocal()
* Backport ICU-21366 (bsc#1182645)
* Update to release 68.2
* Fix memory problem in FormattedStringBuilder
* Fix assertion when setKeywordValue w/ long value.
* Fix UBSan breakage on 8bit of rbbi
* fix int32_t overflow in listFormat
* Fix memory handling in MemoryPool::operator=()
* Fix memory leak in AliasReplacer
* Add back icu.keyring, see https://unicode-org.atlassian.net/browse/ICU-21361
* Update to release 68.1
* CLDR 38
* Measurement unit preferences
* PluralRules selection for ranges of numbers
* Locale ID canonicalization now conforms to the CLDR spec including edge
cases
* DateIntervalFormat supports output options such as capitalization
* Measurement units are normalized in skeleton string output
* Time zone data (tzdata) version 2020d
* Add the provides for libicu to Make .Net core can install successfully.
(bsc#1167603, bsc#1161007)
* Update to version 67.1
* Unicode 13 (ICU-20893, same as in ICU 66)
* Total of 5930 new characters
* 4 new scripts
* 55 new emoji characters, plus additional new sequences
* New CJK extension, first characters in plane 3: U+30000..U+3134A
* CLDR 37
* New language at Modern coverage: Nigerian Pidgin
* New languages at Basic coverage: Fulah (Adlam), Maithili, Manipuri, Santali, Sindhi (Devanagari), Sundanese
* Region containment: EU no longer includes GB
* Unicode 13 root collation data and Chinese data for collation and transliteration
* DateTimePatternGenerator now obeys the "hc" preference in the locale identifier (ICU-20442)
* Various other improvements for ECMA-402 conformance
* Number skeletons have a new "concise" form that can be used in MessageFormat strings (ICU-20418)
* Currency formatting options for formal and other currency display name variants (ICU-20854)
* ListFormatter: new public API to select the style & type (ICU-12863)
* ListFormatter now selects the proper “and”/“or” form for Spanish & Hebrew (ICU-21016)
* Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272)
* LocaleMatcher: New option to ignore one-way matches (ICU-20936), and other tweaks to the code (ICU-20916, ICU-20917) and data (from CLDR)
* acceptLanguage() reimplemented via LocaleMatcher (ICU-20700)
* Data build tool: tzdbNames.res moved from the "zone_tree" category to the "zone_supplemental" category (ICU-21073)
* Fixed uses of u8"literals" broken by the C++20 introduction of the incompatible char8_t type (ICU-20972),
* and added a few API overloads to reduce the need for reinterpret_cast (ICU-20984).
* Support for manipulating CLDR 37 unit identifiers in MeasureUnit.
* Fix potential integer overflow in UnicodeString:doAppend (bsc#1166844, CVE-2020-10531).
* Update to version 66.1
* Unicode 13 support
* Fix uses of u8"literals" broken by C++20 introduction of incompatible
char8_t type. (ICU-20972)
* use LocalMemory for cmd to prevent use after free (bsc#1193951
CVE-2020-21913).
* Remove /usr/lib(64)/icu/current [bsc#1158955].
* Update to release 65.1 (jsc#SLE-11118).
* Updated to CLDR 36 locale data with many additions and corrections, and some
new measurement units.
* The Java LocaleMatcher API is improved, and ported to C++.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-3563=1
* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3563=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3563=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3563=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3563=1
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3563=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3563=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3563=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3563=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3563=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3563=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3563=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3563=1
* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3563=1
## Package List:
* SUSE Manager Retail Branch Server 4.2 (x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* SUSE Manager Retail Branch Server 4.2 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* SUSE Manager Server 4.2 (ppc64le s390x x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* SUSE Manager Server 4.2 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* icu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* openSUSE Leap 15.4 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* icu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* openSUSE Leap 15.5 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* libicu73_2-debuginfo-73.2-150000.1.3.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* Basesystem Module 15-SP4 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* Basesystem Module 15-SP5 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
* libicu73_2-bedata-73.2-150000.1.3.1
* SUSE Manager Proxy 4.2 (x86_64)
* libicu73_2-debuginfo-73.2-150000.1.3.1
* libicu73_2-73.2-150000.1.3.1
* icu73_2-debugsource-73.2-150000.1.3.1
* libicu73_2-devel-73.2-150000.1.3.1
* libicu73_2-doc-73.2-150000.1.3.1
* SUSE Manager Proxy 4.2 (noarch)
* libicu73_2-ledata-73.2-150000.1.3.1
## References:
* https://www.suse.com/security/cve/CVE-2020-10531.html
* https://www.suse.com/security/cve/CVE-2020-21913.html
* https://bugzilla.suse.com/show_bug.cgi?id=1030253
* https://bugzilla.suse.com/show_bug.cgi?id=1095425
* https://bugzilla.suse.com/show_bug.cgi?id=1103893
* https://bugzilla.suse.com/show_bug.cgi?id=1112183
* https://bugzilla.suse.com/show_bug.cgi?id=1146907
* https://bugzilla.suse.com/show_bug.cgi?id=1158955
* https://bugzilla.suse.com/show_bug.cgi?id=1159131
* https://bugzilla.suse.com/show_bug.cgi?id=1161007
* https://bugzilla.suse.com/show_bug.cgi?id=1162882
* https://bugzilla.suse.com/show_bug.cgi?id=1166844
* https://bugzilla.suse.com/show_bug.cgi?id=1167603
* https://bugzilla.suse.com/show_bug.cgi?id=1182252
* https://bugzilla.suse.com/show_bug.cgi?id=1182645
* https://bugzilla.suse.com/show_bug.cgi?id=1192935
* https://bugzilla.suse.com/show_bug.cgi?id=1193951
* https://bugzilla.suse.com/show_bug.cgi?id=354372
* https://bugzilla.suse.com/show_bug.cgi?id=437293
* https://bugzilla.suse.com/show_bug.cgi?id=824262
* https://jira.suse.com/browse/PED-4917
* https://jira.suse.com/browse/SLE-11118
1
0
openSUSE-SU-2023:0244-1: important: Security update for chromium
by opensuse-security@opensuse.org 06 Sep '23
by opensuse-security@opensuse.org 06 Sep '23
06 Sep '23
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0244-1
Rating: important
References: #1214758
Cross-References: CVE-2023-4572
CVSS scores:
CVE-2023-4572 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for chromium fixes the following issues:
Update to version 116.0.5845.140 (boo#1214758):
* CVE-2023-4572: Use after free in MediaStream
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2023-244=1
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-244=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-116.0.5845.140-bp155.2.25.1
chromedriver-debuginfo-116.0.5845.140-bp155.2.25.1
chromium-116.0.5845.140-bp155.2.25.1
chromium-debuginfo-116.0.5845.140-bp155.2.25.1
- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):
chromedriver-116.0.5845.140-bp154.2.111.1
chromium-116.0.5845.140-bp154.2.111.1
References:
https://www.suse.com/security/cve/CVE-2023-4572.html
https://bugzilla.suse.com/1214758
1
0
05 Sep '23
# Security update for docker
Announcement ID: SUSE-SU-2023:3536-1
Rating: moderate
References:
* #1210797
* #1212368
* #1213120
* #1213229
* #1213500
* #1214107
* #1214108
* #1214109
Cross-References:
* CVE-2023-28840
* CVE-2023-28841
* CVE-2023-28842
CVSS scores:
* CVE-2023-28840 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L
* CVE-2023-28840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L
* CVE-2023-28841 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-28841 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-28842 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
* CVE-2023-28842 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Affected Products:
* Containers Module 15-SP4
* Containers Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities and has five security fixes can now
be installed.
## Description:
This update for docker fixes the following issues:
* Update to Docker 24.0.5-ce.
See upstream changelong online at <https://docs.docker.com/engine/release-
notes/24.0/#2405> bsc#1213229
* Update to Docker 24.0.4-ce.
See upstream changelog online at <https://docs.docker.com/engine/release-
notes/24.0/#2404>. bsc#1213500
* Update to Docker 24.0.3-ce.
See upstream changelog online at <https://docs.docker.com/engine/release-
notes/24.0/#2403>. bsc#1213120
* Recommend docker-rootless-extras instead of Require(ing) it, given it's an
additional functionality and not inherently required for docker to function.
* Add docker-rootless-extras subpackage
(https://docs.docker.com/engine/security/rootless)
* Update to Docker 24.0.2-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/24.0/#2402>. bsc#1212368
* Includes the upstreamed fix for the mount table pollution issue. bsc#1210797
* Add Recommends for docker-buildx, and add /usr/lib/docker/cli-plugins as
being provided by this package.
* was rebuilt against current GO compiler.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3536=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3536=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3536=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3536=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3536=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3536=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-3536=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2023-3536=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3536=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3536=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3536=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3536=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3536=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3536=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3536=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3536=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3536=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3536=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3536=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3536=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3536=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3536=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* openSUSE Leap 15.4 (noarch)
* docker-zsh-completion-24.0.5_ce-150000.185.1
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* openSUSE Leap 15.5 (noarch)
* docker-zsh-completion-24.0.5_ce-150000.185.1
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* Containers Module 15-SP4 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* Containers Module 15-SP5 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch)
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Enterprise Storage 7.1 (noarch)
* docker-fish-completion-24.0.5_ce-150000.185.1
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE CaaS Platform 4.0 (x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE CaaS Platform 4.0 (noarch)
* docker-bash-completion-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* docker-debuginfo-24.0.5_ce-150000.185.1
* docker-24.0.5_ce-150000.185.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28840.html
* https://www.suse.com/security/cve/CVE-2023-28841.html
* https://www.suse.com/security/cve/CVE-2023-28842.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210797
* https://bugzilla.suse.com/show_bug.cgi?id=1212368
* https://bugzilla.suse.com/show_bug.cgi?id=1213120
* https://bugzilla.suse.com/show_bug.cgi?id=1213229
* https://bugzilla.suse.com/show_bug.cgi?id=1213500
* https://bugzilla.suse.com/show_bug.cgi?id=1214107
* https://bugzilla.suse.com/show_bug.cgi?id=1214108
* https://bugzilla.suse.com/show_bug.cgi?id=1214109
1
0
SUSE-SU-2023:3537-1: important: Security update for amazon-ssm-agent
by security@lists.opensuse.org 05 Sep '23
by security@lists.opensuse.org 05 Sep '23
05 Sep '23
# Security update for amazon-ssm-agent
Announcement ID: SUSE-SU-2023:3537-1
Rating: important
References:
* #1212475
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP1
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.0
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.0
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of amazon-ssm-agent fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3537=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3537=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3537=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3537=1
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3537=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3537=1
* Public Cloud Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3537=1
## Package List:
* Public Cloud Module 15-SP2 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* Public Cloud Module 15-SP3 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* Public Cloud Module 15-SP4 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
* Public Cloud Module 15-SP1 (aarch64 x86_64)
* amazon-ssm-agent-3.1.1260.0-150000.5.17.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0
05 Sep '23
# Security update for php7
Announcement ID: SUSE-SU-2023:3541-1
Rating: important
References:
* #1214103
* #1214106
Cross-References:
* CVE-2023-3823
* CVE-2023-3824
CVSS scores:
* CVE-2023-3823 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3823 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2023-3824 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-3824 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Affected Products:
* Legacy Module 15-SP4
* Legacy Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for php7 fixes the following issues:
* CVE-2023-3823: Fixed an issue with external entity loading in XML without
enabling it. (bsc#1214106)
* CVE-2023-3824: Fixed a buffer overflow in phar_dir_read(). (bsc#1214103)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3541=1 SUSE-2023-3541=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3541=1
* Legacy Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2023-3541=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2023-3541=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3541=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3541=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php7-mbstring-debuginfo-7.4.33-150400.4.28.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-7.4.33-150400.4.28.1
* php7-gettext-7.4.33-150400.4.28.1
* php7-gd-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-7.4.33-150400.4.28.1
* php7-devel-7.4.33-150400.4.28.1
* php7-dom-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-7.4.33-150400.4.28.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.28.1
* php7-json-7.4.33-150400.4.28.1
* php7-openssl-7.4.33-150400.4.28.1
* php7-zlib-debuginfo-7.4.33-150400.4.28.1
* php7-iconv-7.4.33-150400.4.28.1
* php7-pcntl-7.4.33-150400.4.28.1
* php7-tidy-7.4.33-150400.4.28.1
* php7-zip-7.4.33-150400.4.28.1
* php7-dba-7.4.33-150400.4.28.1
* php7-xsl-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-debuginfo-7.4.33-150400.4.28.1
* php7-mbstring-7.4.33-150400.4.28.1
* php7-ftp-debuginfo-7.4.33-150400.4.28.1
* php7-zlib-7.4.33-150400.4.28.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-debugsource-7.4.33-150400.4.28.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.28.1
* php7-readline-7.4.33-150400.4.28.1
* php7-phar-7.4.33-150400.4.28.1
* php7-odbc-7.4.33-150400.4.28.1
* php7-embed-debugsource-7.4.33-150400.4.28.1
* php7-zip-debuginfo-7.4.33-150400.4.28.1
* php7-dom-7.4.33-150400.4.28.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-7.4.33-150400.4.28.1
* php7-embed-debuginfo-7.4.33-150400.4.28.1
* php7-intl-7.4.33-150400.4.28.1
* php7-sockets-debuginfo-7.4.33-150400.4.28.1
* php7-debuginfo-7.4.33-150400.4.28.1
* php7-cli-debuginfo-7.4.33-150400.4.28.1
* php7-embed-7.4.33-150400.4.28.1
* php7-enchant-debuginfo-7.4.33-150400.4.28.1
* php7-readline-debuginfo-7.4.33-150400.4.28.1
* php7-sockets-7.4.33-150400.4.28.1
* php7-intl-debuginfo-7.4.33-150400.4.28.1
* php7-json-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-7.4.33-150400.4.28.1
* php7-shmop-7.4.33-150400.4.28.1
* php7-sysvshm-7.4.33-150400.4.28.1
* php7-xmlrpc-7.4.33-150400.4.28.1
* php7-ldap-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-7.4.33-150400.4.28.1
* php7-pgsql-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-7.4.33-150400.4.28.1
* php7-tokenizer-7.4.33-150400.4.28.1
* php7-dba-debuginfo-7.4.33-150400.4.28.1
* php7-soap-debuginfo-7.4.33-150400.4.28.1
* php7-cli-7.4.33-150400.4.28.1
* php7-fastcgi-debugsource-7.4.33-150400.4.28.1
* php7-fileinfo-7.4.33-150400.4.28.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-debuginfo-7.4.33-150400.4.28.1
* php7-7.4.33-150400.4.28.1
* php7-xsl-7.4.33-150400.4.28.1
* php7-curl-debuginfo-7.4.33-150400.4.28.1
* php7-gettext-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.28.1
* php7-ftp-7.4.33-150400.4.28.1
* php7-phar-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-7.4.33-150400.4.28.1
* php7-shmop-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-7.4.33-150400.4.28.1
* php7-iconv-debuginfo-7.4.33-150400.4.28.1
* php7-xmlwriter-7.4.33-150400.4.28.1
* php7-exif-debuginfo-7.4.33-150400.4.28.1
* php7-pcntl-debuginfo-7.4.33-150400.4.28.1
* php7-odbc-debuginfo-7.4.33-150400.4.28.1
* php7-bz2-debuginfo-7.4.33-150400.4.28.1
* php7-debugsource-7.4.33-150400.4.28.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.28.1
* php7-ldap-7.4.33-150400.4.28.1
* php7-posix-debuginfo-7.4.33-150400.4.28.1
* php7-pgsql-7.4.33-150400.4.28.1
* php7-test-7.4.33-150400.4.28.1
* php7-posix-7.4.33-150400.4.28.1
* php7-curl-7.4.33-150400.4.28.1
* php7-enchant-7.4.33-150400.4.28.1
* php7-opcache-7.4.33-150400.4.28.1
* php7-pdo-debuginfo-7.4.33-150400.4.28.1
* php7-opcache-debuginfo-7.4.33-150400.4.28.1
* php7-exif-7.4.33-150400.4.28.1
* php7-bz2-7.4.33-150400.4.28.1
* php7-sysvsem-7.4.33-150400.4.28.1
* php7-ctype-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-debuginfo-7.4.33-150400.4.28.1
* php7-tidy-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-7.4.33-150400.4.28.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.28.1
* php7-sysvmsg-7.4.33-150400.4.28.1
* php7-fpm-debuginfo-7.4.33-150400.4.28.1
* php7-ctype-7.4.33-150400.4.28.1
* php7-gd-7.4.33-150400.4.28.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.28.1
* php7-soap-7.4.33-150400.4.28.1
* php7-pdo-7.4.33-150400.4.28.1
* php7-openssl-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.28.1
* php7-fastcgi-7.4.33-150400.4.28.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* php7-mbstring-debuginfo-7.4.33-150400.4.28.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-7.4.33-150400.4.28.1
* php7-gettext-7.4.33-150400.4.28.1
* php7-gd-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-7.4.33-150400.4.28.1
* php7-devel-7.4.33-150400.4.28.1
* php7-dom-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-7.4.33-150400.4.28.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.28.1
* php7-json-7.4.33-150400.4.28.1
* php7-openssl-7.4.33-150400.4.28.1
* php7-zlib-debuginfo-7.4.33-150400.4.28.1
* php7-iconv-7.4.33-150400.4.28.1
* php7-pcntl-7.4.33-150400.4.28.1
* php7-tidy-7.4.33-150400.4.28.1
* php7-zip-7.4.33-150400.4.28.1
* php7-dba-7.4.33-150400.4.28.1
* php7-xsl-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-debuginfo-7.4.33-150400.4.28.1
* php7-mbstring-7.4.33-150400.4.28.1
* php7-ftp-debuginfo-7.4.33-150400.4.28.1
* php7-zlib-7.4.33-150400.4.28.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-debugsource-7.4.33-150400.4.28.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.28.1
* php7-readline-7.4.33-150400.4.28.1
* php7-phar-7.4.33-150400.4.28.1
* php7-odbc-7.4.33-150400.4.28.1
* php7-embed-debugsource-7.4.33-150400.4.28.1
* php7-zip-debuginfo-7.4.33-150400.4.28.1
* php7-dom-7.4.33-150400.4.28.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-7.4.33-150400.4.28.1
* php7-embed-debuginfo-7.4.33-150400.4.28.1
* php7-intl-7.4.33-150400.4.28.1
* php7-sockets-debuginfo-7.4.33-150400.4.28.1
* php7-debuginfo-7.4.33-150400.4.28.1
* php7-cli-debuginfo-7.4.33-150400.4.28.1
* php7-embed-7.4.33-150400.4.28.1
* php7-enchant-debuginfo-7.4.33-150400.4.28.1
* php7-readline-debuginfo-7.4.33-150400.4.28.1
* php7-sockets-7.4.33-150400.4.28.1
* php7-intl-debuginfo-7.4.33-150400.4.28.1
* php7-json-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-7.4.33-150400.4.28.1
* php7-shmop-7.4.33-150400.4.28.1
* php7-sysvshm-7.4.33-150400.4.28.1
* php7-xmlrpc-7.4.33-150400.4.28.1
* php7-ldap-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-7.4.33-150400.4.28.1
* php7-pgsql-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-7.4.33-150400.4.28.1
* php7-tokenizer-7.4.33-150400.4.28.1
* php7-dba-debuginfo-7.4.33-150400.4.28.1
* php7-soap-debuginfo-7.4.33-150400.4.28.1
* php7-cli-7.4.33-150400.4.28.1
* php7-fastcgi-debugsource-7.4.33-150400.4.28.1
* php7-fileinfo-7.4.33-150400.4.28.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-debuginfo-7.4.33-150400.4.28.1
* php7-7.4.33-150400.4.28.1
* php7-xsl-7.4.33-150400.4.28.1
* php7-curl-debuginfo-7.4.33-150400.4.28.1
* php7-gettext-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.28.1
* php7-ftp-7.4.33-150400.4.28.1
* php7-phar-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-7.4.33-150400.4.28.1
* php7-shmop-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-7.4.33-150400.4.28.1
* php7-iconv-debuginfo-7.4.33-150400.4.28.1
* php7-xmlwriter-7.4.33-150400.4.28.1
* php7-exif-debuginfo-7.4.33-150400.4.28.1
* php7-pcntl-debuginfo-7.4.33-150400.4.28.1
* php7-odbc-debuginfo-7.4.33-150400.4.28.1
* php7-bz2-debuginfo-7.4.33-150400.4.28.1
* php7-debugsource-7.4.33-150400.4.28.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.28.1
* php7-ldap-7.4.33-150400.4.28.1
* php7-posix-debuginfo-7.4.33-150400.4.28.1
* php7-pgsql-7.4.33-150400.4.28.1
* php7-test-7.4.33-150400.4.28.1
* php7-posix-7.4.33-150400.4.28.1
* php7-curl-7.4.33-150400.4.28.1
* php7-enchant-7.4.33-150400.4.28.1
* php7-opcache-7.4.33-150400.4.28.1
* php7-pdo-debuginfo-7.4.33-150400.4.28.1
* php7-opcache-debuginfo-7.4.33-150400.4.28.1
* php7-exif-7.4.33-150400.4.28.1
* php7-bz2-7.4.33-150400.4.28.1
* php7-sysvsem-7.4.33-150400.4.28.1
* php7-ctype-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-debuginfo-7.4.33-150400.4.28.1
* php7-tidy-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-7.4.33-150400.4.28.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.28.1
* php7-sysvmsg-7.4.33-150400.4.28.1
* php7-fpm-debuginfo-7.4.33-150400.4.28.1
* php7-ctype-7.4.33-150400.4.28.1
* php7-gd-7.4.33-150400.4.28.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.28.1
* php7-soap-7.4.33-150400.4.28.1
* php7-pdo-7.4.33-150400.4.28.1
* php7-openssl-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.28.1
* php7-fastcgi-7.4.33-150400.4.28.1
* Legacy Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* php7-mbstring-debuginfo-7.4.33-150400.4.28.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-7.4.33-150400.4.28.1
* php7-gettext-7.4.33-150400.4.28.1
* php7-gd-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-7.4.33-150400.4.28.1
* php7-devel-7.4.33-150400.4.28.1
* php7-dom-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-7.4.33-150400.4.28.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.28.1
* php7-json-7.4.33-150400.4.28.1
* php7-openssl-7.4.33-150400.4.28.1
* php7-zlib-debuginfo-7.4.33-150400.4.28.1
* php7-iconv-7.4.33-150400.4.28.1
* php7-pcntl-7.4.33-150400.4.28.1
* php7-tidy-7.4.33-150400.4.28.1
* php7-zip-7.4.33-150400.4.28.1
* php7-dba-7.4.33-150400.4.28.1
* php7-xsl-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-debuginfo-7.4.33-150400.4.28.1
* php7-mbstring-7.4.33-150400.4.28.1
* php7-ftp-debuginfo-7.4.33-150400.4.28.1
* php7-zlib-7.4.33-150400.4.28.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-debugsource-7.4.33-150400.4.28.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.28.1
* php7-readline-7.4.33-150400.4.28.1
* php7-phar-7.4.33-150400.4.28.1
* php7-odbc-7.4.33-150400.4.28.1
* php7-zip-debuginfo-7.4.33-150400.4.28.1
* php7-dom-7.4.33-150400.4.28.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-7.4.33-150400.4.28.1
* php7-intl-7.4.33-150400.4.28.1
* php7-sockets-debuginfo-7.4.33-150400.4.28.1
* php7-debuginfo-7.4.33-150400.4.28.1
* php7-cli-debuginfo-7.4.33-150400.4.28.1
* php7-enchant-debuginfo-7.4.33-150400.4.28.1
* php7-readline-debuginfo-7.4.33-150400.4.28.1
* php7-sockets-7.4.33-150400.4.28.1
* php7-intl-debuginfo-7.4.33-150400.4.28.1
* php7-json-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-7.4.33-150400.4.28.1
* php7-shmop-7.4.33-150400.4.28.1
* php7-sysvshm-7.4.33-150400.4.28.1
* php7-xmlrpc-7.4.33-150400.4.28.1
* php7-ldap-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-7.4.33-150400.4.28.1
* php7-pgsql-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-7.4.33-150400.4.28.1
* php7-tokenizer-7.4.33-150400.4.28.1
* php7-dba-debuginfo-7.4.33-150400.4.28.1
* php7-soap-debuginfo-7.4.33-150400.4.28.1
* php7-cli-7.4.33-150400.4.28.1
* php7-fastcgi-debugsource-7.4.33-150400.4.28.1
* php7-fileinfo-7.4.33-150400.4.28.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-debuginfo-7.4.33-150400.4.28.1
* php7-7.4.33-150400.4.28.1
* php7-xsl-7.4.33-150400.4.28.1
* php7-curl-debuginfo-7.4.33-150400.4.28.1
* php7-gettext-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.28.1
* php7-ftp-7.4.33-150400.4.28.1
* php7-phar-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-7.4.33-150400.4.28.1
* php7-shmop-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-7.4.33-150400.4.28.1
* php7-iconv-debuginfo-7.4.33-150400.4.28.1
* php7-xmlwriter-7.4.33-150400.4.28.1
* php7-exif-debuginfo-7.4.33-150400.4.28.1
* php7-pcntl-debuginfo-7.4.33-150400.4.28.1
* php7-odbc-debuginfo-7.4.33-150400.4.28.1
* php7-bz2-debuginfo-7.4.33-150400.4.28.1
* php7-debugsource-7.4.33-150400.4.28.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.28.1
* php7-ldap-7.4.33-150400.4.28.1
* php7-posix-debuginfo-7.4.33-150400.4.28.1
* php7-pgsql-7.4.33-150400.4.28.1
* php7-posix-7.4.33-150400.4.28.1
* php7-curl-7.4.33-150400.4.28.1
* php7-enchant-7.4.33-150400.4.28.1
* php7-opcache-7.4.33-150400.4.28.1
* php7-pdo-debuginfo-7.4.33-150400.4.28.1
* php7-opcache-debuginfo-7.4.33-150400.4.28.1
* php7-exif-7.4.33-150400.4.28.1
* php7-bz2-7.4.33-150400.4.28.1
* php7-sysvsem-7.4.33-150400.4.28.1
* php7-ctype-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-debuginfo-7.4.33-150400.4.28.1
* php7-tidy-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-7.4.33-150400.4.28.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.28.1
* php7-sysvmsg-7.4.33-150400.4.28.1
* php7-fpm-debuginfo-7.4.33-150400.4.28.1
* php7-ctype-7.4.33-150400.4.28.1
* php7-gd-7.4.33-150400.4.28.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.28.1
* php7-soap-7.4.33-150400.4.28.1
* php7-pdo-7.4.33-150400.4.28.1
* php7-openssl-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.28.1
* php7-fastcgi-7.4.33-150400.4.28.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* php7-mbstring-debuginfo-7.4.33-150400.4.28.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-7.4.33-150400.4.28.1
* php7-gettext-7.4.33-150400.4.28.1
* php7-gd-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-debuginfo-7.4.33-150400.4.28.1
* php7-snmp-7.4.33-150400.4.28.1
* php7-devel-7.4.33-150400.4.28.1
* php7-dom-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-7.4.33-150400.4.28.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.28.1
* php7-json-7.4.33-150400.4.28.1
* php7-openssl-7.4.33-150400.4.28.1
* php7-zlib-debuginfo-7.4.33-150400.4.28.1
* php7-iconv-7.4.33-150400.4.28.1
* php7-pcntl-7.4.33-150400.4.28.1
* php7-tidy-7.4.33-150400.4.28.1
* php7-zip-7.4.33-150400.4.28.1
* php7-dba-7.4.33-150400.4.28.1
* php7-xsl-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-debuginfo-7.4.33-150400.4.28.1
* php7-mbstring-7.4.33-150400.4.28.1
* php7-ftp-debuginfo-7.4.33-150400.4.28.1
* php7-zlib-7.4.33-150400.4.28.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.28.1
* php7-fpm-debugsource-7.4.33-150400.4.28.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.28.1
* php7-readline-7.4.33-150400.4.28.1
* php7-phar-7.4.33-150400.4.28.1
* php7-odbc-7.4.33-150400.4.28.1
* php7-zip-debuginfo-7.4.33-150400.4.28.1
* php7-dom-7.4.33-150400.4.28.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-debuginfo-7.4.33-150400.4.28.1
* php7-calendar-7.4.33-150400.4.28.1
* php7-intl-7.4.33-150400.4.28.1
* php7-sockets-debuginfo-7.4.33-150400.4.28.1
* php7-debuginfo-7.4.33-150400.4.28.1
* php7-cli-debuginfo-7.4.33-150400.4.28.1
* php7-enchant-debuginfo-7.4.33-150400.4.28.1
* php7-readline-debuginfo-7.4.33-150400.4.28.1
* php7-sockets-7.4.33-150400.4.28.1
* php7-intl-debuginfo-7.4.33-150400.4.28.1
* php7-json-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-7.4.33-150400.4.28.1
* php7-shmop-7.4.33-150400.4.28.1
* php7-sysvshm-7.4.33-150400.4.28.1
* php7-xmlrpc-7.4.33-150400.4.28.1
* php7-ldap-debuginfo-7.4.33-150400.4.28.1
* php7-bcmath-7.4.33-150400.4.28.1
* php7-pgsql-debuginfo-7.4.33-150400.4.28.1
* php7-gmp-7.4.33-150400.4.28.1
* php7-tokenizer-7.4.33-150400.4.28.1
* php7-dba-debuginfo-7.4.33-150400.4.28.1
* php7-soap-debuginfo-7.4.33-150400.4.28.1
* php7-cli-7.4.33-150400.4.28.1
* php7-fastcgi-debugsource-7.4.33-150400.4.28.1
* php7-fileinfo-7.4.33-150400.4.28.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-debuginfo-7.4.33-150400.4.28.1
* php7-7.4.33-150400.4.28.1
* php7-xsl-7.4.33-150400.4.28.1
* php7-curl-debuginfo-7.4.33-150400.4.28.1
* php7-gettext-debuginfo-7.4.33-150400.4.28.1
* php7-mysql-debuginfo-7.4.33-150400.4.28.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.28.1
* php7-ftp-7.4.33-150400.4.28.1
* php7-phar-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-7.4.33-150400.4.28.1
* php7-shmop-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-7.4.33-150400.4.28.1
* php7-iconv-debuginfo-7.4.33-150400.4.28.1
* php7-xmlwriter-7.4.33-150400.4.28.1
* php7-exif-debuginfo-7.4.33-150400.4.28.1
* php7-pcntl-debuginfo-7.4.33-150400.4.28.1
* php7-odbc-debuginfo-7.4.33-150400.4.28.1
* php7-bz2-debuginfo-7.4.33-150400.4.28.1
* php7-debugsource-7.4.33-150400.4.28.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.28.1
* php7-ldap-7.4.33-150400.4.28.1
* php7-posix-debuginfo-7.4.33-150400.4.28.1
* php7-pgsql-7.4.33-150400.4.28.1
* php7-posix-7.4.33-150400.4.28.1
* php7-curl-7.4.33-150400.4.28.1
* php7-enchant-7.4.33-150400.4.28.1
* php7-opcache-7.4.33-150400.4.28.1
* php7-pdo-debuginfo-7.4.33-150400.4.28.1
* php7-opcache-debuginfo-7.4.33-150400.4.28.1
* php7-exif-7.4.33-150400.4.28.1
* php7-bz2-7.4.33-150400.4.28.1
* php7-sysvsem-7.4.33-150400.4.28.1
* php7-ctype-debuginfo-7.4.33-150400.4.28.1
* php7-sqlite-debuginfo-7.4.33-150400.4.28.1
* php7-tidy-debuginfo-7.4.33-150400.4.28.1
* php7-sodium-7.4.33-150400.4.28.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.28.1
* php7-sysvmsg-7.4.33-150400.4.28.1
* php7-fpm-debuginfo-7.4.33-150400.4.28.1
* php7-ctype-7.4.33-150400.4.28.1
* php7-gd-7.4.33-150400.4.28.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.28.1
* php7-soap-7.4.33-150400.4.28.1
* php7-pdo-7.4.33-150400.4.28.1
* php7-openssl-debuginfo-7.4.33-150400.4.28.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.28.1
* php7-fastcgi-7.4.33-150400.4.28.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* php7-embed-debugsource-7.4.33-150400.4.28.1
* php7-embed-7.4.33-150400.4.28.1
* php7-embed-debuginfo-7.4.33-150400.4.28.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* php7-embed-debugsource-7.4.33-150400.4.28.1
* php7-embed-7.4.33-150400.4.28.1
* php7-embed-debuginfo-7.4.33-150400.4.28.1
## References:
* https://www.suse.com/security/cve/CVE-2023-3823.html
* https://www.suse.com/security/cve/CVE-2023-3824.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214103
* https://bugzilla.suse.com/show_bug.cgi?id=1214106
1
0
05 Sep '23
# Security update for exempi
Announcement ID: SUSE-SU-2023:3518-1
Rating: moderate
References:
* #1214488
Cross-References:
* CVE-2020-18652
CVSS scores:
* CVE-2020-18652 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2020-18652 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP4
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for exempi fixes the following issues:
* CVE-2020-18652: Fixed buffer overflow vulnerability in WEBP_Support.cpp
(bsc#1214488).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3518=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3518=1
* Desktop Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3518=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3518=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libexempi3-debuginfo-2.4.5-150000.3.6.1
* exempi-tools-2.4.5-150000.3.6.1
* exempi-tools-debuginfo-2.4.5-150000.3.6.1
* libexempi-devel-2.4.5-150000.3.6.1
* exempi-debugsource-2.4.5-150000.3.6.1
* libexempi3-2.4.5-150000.3.6.1
* openSUSE Leap 15.4 (x86_64)
* libexempi3-32bit-2.4.5-150000.3.6.1
* libexempi3-32bit-debuginfo-2.4.5-150000.3.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libexempi3-debuginfo-2.4.5-150000.3.6.1
* exempi-tools-2.4.5-150000.3.6.1
* exempi-tools-debuginfo-2.4.5-150000.3.6.1
* libexempi-devel-2.4.5-150000.3.6.1
* exempi-debugsource-2.4.5-150000.3.6.1
* libexempi3-2.4.5-150000.3.6.1
* openSUSE Leap 15.5 (x86_64)
* libexempi3-32bit-2.4.5-150000.3.6.1
* libexempi3-32bit-debuginfo-2.4.5-150000.3.6.1
* Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libexempi3-2.4.5-150000.3.6.1
* libexempi3-debuginfo-2.4.5-150000.3.6.1
* libexempi-devel-2.4.5-150000.3.6.1
* exempi-debugsource-2.4.5-150000.3.6.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libexempi3-2.4.5-150000.3.6.1
* libexempi3-debuginfo-2.4.5-150000.3.6.1
* libexempi-devel-2.4.5-150000.3.6.1
* exempi-debugsource-2.4.5-150000.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2020-18652.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214488
1
0
SUSE-SU-2023:3519-1: important: Security update for MozillaFirefox
by security@lists.opensuse.org 05 Sep '23
by security@lists.opensuse.org 05 Sep '23
05 Sep '23
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2023:3519-1
Rating: important
References:
* #1214606
Cross-References:
* CVE-2023-4051
* CVE-2023-4053
* CVE-2023-4574
* CVE-2023-4575
* CVE-2023-4576
* CVE-2023-4577
* CVE-2023-4578
* CVE-2023-4580
* CVE-2023-4581
* CVE-2023-4582
* CVE-2023-4583
* CVE-2023-4584
* CVE-2023-4585
CVSS scores:
* CVE-2023-4051 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-4053 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Affected Products:
* Desktop Applications Module 15-SP4
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 13 vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Firefox was updated to Extended Support Release 115.2.0 ESR (MFSA 2023-36)
(bsc#1214606).
* CVE-2023-4574: Fixed memory corruption in IPC ColorPickerShownCallback
(bmo#1846688)
* CVE-2023-4575: Fixed memory corruption in IPC FilePickerShownCallback
(bmo#1846689)
* CVE-2023-4576: Fixed integer Overflow in RecordedSourceSurfaceCreation
(bmo#1846694)
* CVE-2023-4577: Fixed memory corruption in JIT UpdateRegExpStatics
(bmo#1847397)
* CVE-2023-4051: Fixed full screen notification obscured by file open dialog
(bmo#1821884)
* CVE-2023-4578: Fixed Out of Memory Exception in SpiderMonkey could have
triggered an (bmo#1839007)
* CVE-2023-4053: Fixed full screen notification obscured by external program
(bmo#1839079)
* CVE-2023-4580: Fixed push notifications saved to disk unencrypted
(bmo#1843046)
* CVE-2023-4581: Fixed XLL file extensions downloadable without warnings
(bmo#1843758)
* CVE-2023-4582: Fixed buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
* CVE-2023-4583: Fixed browsing Context potentially not cleared when closing
Private Window (bmo#1842030)
* CVE-2023-4584: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR
102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2
(bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529)
* CVE-2023-4585: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR
115.2, and Thunderbird 115.2(bmo#1751583, bmo#1833504, bmo#1841082,
bmo#1847904, bmo#1848999).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3519=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3519=1
* Desktop Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3519=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3519=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3519=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3519=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3519=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3519=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3519=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3519=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3519=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3519=1
* SUSE Enterprise Storage 7
zypper in -t patch SUSE-Storage-7-2023-3519=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* MozillaFirefox-branding-upstream-115.2.0-150200.152.102.1
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* openSUSE Leap 15.4 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* MozillaFirefox-branding-upstream-115.2.0-150200.152.102.1
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* Desktop Applications Module 15-SP4 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
* SUSE Enterprise Storage 7 (aarch64 x86_64)
* MozillaFirefox-115.2.0-150200.152.102.1
* MozillaFirefox-debuginfo-115.2.0-150200.152.102.1
* MozillaFirefox-debugsource-115.2.0-150200.152.102.1
* MozillaFirefox-translations-common-115.2.0-150200.152.102.1
* MozillaFirefox-translations-other-115.2.0-150200.152.102.1
* SUSE Enterprise Storage 7 (noarch)
* MozillaFirefox-devel-115.2.0-150200.152.102.1
## References:
* https://www.suse.com/security/cve/CVE-2023-4051.html
* https://www.suse.com/security/cve/CVE-2023-4053.html
* https://www.suse.com/security/cve/CVE-2023-4574.html
* https://www.suse.com/security/cve/CVE-2023-4575.html
* https://www.suse.com/security/cve/CVE-2023-4576.html
* https://www.suse.com/security/cve/CVE-2023-4577.html
* https://www.suse.com/security/cve/CVE-2023-4578.html
* https://www.suse.com/security/cve/CVE-2023-4580.html
* https://www.suse.com/security/cve/CVE-2023-4581.html
* https://www.suse.com/security/cve/CVE-2023-4582.html
* https://www.suse.com/security/cve/CVE-2023-4583.html
* https://www.suse.com/security/cve/CVE-2023-4584.html
* https://www.suse.com/security/cve/CVE-2023-4585.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214606
1
0
05 Sep '23
# Security update for djvulibre
Announcement ID: SUSE-SU-2023:3520-1
Rating: low
References:
* #1214670
* #1214672
Cross-References:
* CVE-2021-46310
* CVE-2021-46312
CVSS scores:
* CVE-2021-46310 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2021-46310 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-46312 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2021-46312 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP4
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for djvulibre fixes the following issues:
* CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670).
* CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3520=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3520=1
* Desktop Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3520=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3520=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3520=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3520=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* libdjvulibre-devel-3.5.27-150200.11.14.1
* libdjvulibre21-3.5.27-150200.11.14.1
* djvulibre-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* libdjvulibre21-debuginfo-3.5.27-150200.11.14.1
* openSUSE Leap 15.4 (noarch)
* djvulibre-doc-3.5.27-150200.11.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* libdjvulibre-devel-3.5.27-150200.11.14.1
* libdjvulibre21-3.5.27-150200.11.14.1
* djvulibre-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* libdjvulibre21-debuginfo-3.5.27-150200.11.14.1
* openSUSE Leap 15.5 (noarch)
* djvulibre-doc-3.5.27-150200.11.14.1
* Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* libdjvulibre21-3.5.27-150200.11.14.1
* libdjvulibre-devel-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* libdjvulibre21-debuginfo-3.5.27-150200.11.14.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* libdjvulibre21-3.5.27-150200.11.14.1
* libdjvulibre-devel-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* libdjvulibre21-debuginfo-3.5.27-150200.11.14.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* djvulibre-3.5.27-150200.11.14.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* djvulibre-debuginfo-3.5.27-150200.11.14.1
* djvulibre-debugsource-3.5.27-150200.11.14.1
* djvulibre-3.5.27-150200.11.14.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46310.html
* https://www.suse.com/security/cve/CVE-2021-46312.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214670
* https://bugzilla.suse.com/show_bug.cgi?id=1214672
1
0
SUSE-SU-2023:3522-1: important: Security update for amazon-ecs-init
by security@lists.opensuse.org 05 Sep '23
by security@lists.opensuse.org 05 Sep '23
05 Sep '23
# Security update for amazon-ecs-init
Announcement ID: SUSE-SU-2023:3522-1
Rating: important
References:
* #1212475
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP1
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.0
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.0
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of amazon-ecs-init fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3522=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3522=1
* Public Cloud Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3522=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3522=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3522=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3522=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3522=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* Public Cloud Module 15-SP1 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* Public Cloud Module 15-SP2 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* Public Cloud Module 15-SP3 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* Public Cloud Module 15-SP4 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* amazon-ecs-init-1.53.0-150100.4.17.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0