openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
April 2024
- 2 participants
- 84 discussions
23 Apr '24
# Security update for qemu
Announcement ID: SUSE-SU-2024:1394-1
Rating: important
References:
* bsc#1213269
* bsc#1218889
* bsc#1220134
* bsc#1222843
* bsc#1222845
Cross-References:
* CVE-2023-3019
* CVE-2023-6683
* CVE-2024-24474
* CVE-2024-3446
* CVE-2024-3447
CVSS scores:
* CVE-2023-3019 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-3019 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-6683 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6683 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24474 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-3446 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-3447 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest()
(bsc#1213269)
* CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request()
(bsc#1218889)
* CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI
command (bsc#1220134)
* CVE-2024-3446: Fixed DM reentrancy issue that could lead to double free
vulnerability (bsc#1222843)
* CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport()
(bsc#1222845)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1394=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1394=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1394=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1394=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1394=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1394=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1394=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1394=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1394=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-oss-6.2.0-150400.37.29.1
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-ivshmem-tools-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-extra-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* qemu-block-nfs-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-nfs-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-qtest-6.2.0-150400.37.29.1
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-gluster-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-dmg-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-extra-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-jack-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-smartcard-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-block-dmg-debuginfo-6.2.0-150400.37.29.1
* qemu-block-gluster-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.29.1
* qemu-linux-user-6.2.0-150400.37.29.1
* qemu-audio-jack-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-vhost-user-gpu-6.2.0-150400.37.29.1
* qemu-linux-user-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-audio-oss-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-linux-user-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-microvm-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* openSUSE Leap Micro 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* openSUSE Leap Micro 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Proxy 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (x86_64)
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
## References:
* https://www.suse.com/security/cve/CVE-2023-3019.html
* https://www.suse.com/security/cve/CVE-2023-6683.html
* https://www.suse.com/security/cve/CVE-2024-24474.html
* https://www.suse.com/security/cve/CVE-2024-3446.html
* https://www.suse.com/security/cve/CVE-2024-3447.html
* https://bugzilla.suse.com/show_bug.cgi?id=1213269
* https://bugzilla.suse.com/show_bug.cgi?id=1218889
* https://bugzilla.suse.com/show_bug.cgi?id=1220134
* https://bugzilla.suse.com/show_bug.cgi?id=1222843
* https://bugzilla.suse.com/show_bug.cgi?id=1222845
1
0
SUSE-SU-2024:1377-1: moderate: Security update for apache-commons-configuration
by OPENSUSE-SECURITY-UPDATES 22 Apr '24
by OPENSUSE-SECURITY-UPDATES 22 Apr '24
22 Apr '24
# Security update for apache-commons-configuration
Announcement ID: SUSE-SU-2024:1377-1
Rating: moderate
References:
* bsc#1221793
* bsc#1221797
Cross-References:
* CVE-2024-29131
* CVE-2024-29133
CVSS scores:
* CVE-2024-29131 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-29133 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for apache-commons-configuration fixes the following issues:
* CVE-2024-29131: Fixed StackOverflowError adding property in
AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
* CVE-2024-29133: Fixed StackOverflowError calling
ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
(bsc#1221793).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1377=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1377=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* apache-commons-configuration-javadoc-1.10-150200.3.11.1
* apache-commons-configuration-1.10-150200.3.11.1
* Development Tools Module 15-SP5 (noarch)
* apache-commons-configuration-1.10-150200.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2024-29131.html
* https://www.suse.com/security/cve/CVE-2024-29133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221793
* https://bugzilla.suse.com/show_bug.cgi?id=1221797
1
0
22 Apr '24
# Security update for glibc
Announcement ID: SUSE-SU-2024:1375-1
Rating: important
References:
* bsc#1222992
Cross-References:
* CVE-2024-2961
CVSS scores:
* CVE-2024-2961 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for glibc fixes the following issues:
* iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence
(CVE-2024-2961, bsc#1222992)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1375=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1375=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1375=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1375=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1375=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1375=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1375=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1375=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1375=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1375=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1375=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1375=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1375=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1375=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1375=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1375=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1375=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1375=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1375=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1375=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-devel-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* glibc-extra-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* openSUSE Leap 15.3 (noarch)
* glibc-lang-2.31-150300.74.1
* glibc-html-2.31-150300.74.1
* glibc-info-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* openSUSE Leap 15.3 (x86_64)
* glibc-utils-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-profile-32bit-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-static-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-utils-32bit-debuginfo-2.31-150300.74.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* glibc-utils-64bit-debuginfo-2.31-150300.74.1
* glibc-devel-64bit-2.31-150300.74.1
* glibc-utils-64bit-2.31-150300.74.1
* glibc-locale-base-64bit-2.31-150300.74.1
* glibc-devel-static-64bit-2.31-150300.74.1
* glibc-64bit-debuginfo-2.31-150300.74.1
* glibc-profile-64bit-2.31-150300.74.1
* glibc-devel-64bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-64bit-debuginfo-2.31-150300.74.1
* glibc-64bit-2.31-150300.74.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* openSUSE Leap 15.5 (x86_64)
* glibc-utils-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-profile-32bit-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-static-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-utils-32bit-debuginfo-2.31-150300.74.1
* openSUSE Leap 15.5 (noarch)
* glibc-lang-2.31-150300.74.1
* glibc-html-2.31-150300.74.1
* glibc-info-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* Basesystem Module 15-SP5 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* Basesystem Module 15-SP5 (x86_64)
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* Development Tools Module 15-SP5 (x86_64)
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Manager Proxy 4.3 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Proxy 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Server 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Server 4.3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2961.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222992
1
0
22 Apr '24
# Security update for polkit
Announcement ID: SUSE-SU-2024:1376-1
Rating: low
References:
* bsc#1209282
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one security fix can now be installed.
## Description:
This update for polkit fixes the following issues:
* Change permissions for rules folders (bsc#1209282)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1376=1 openSUSE-SLE-15.5-2024-1376=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1376=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1376=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* polkit-devel-121-150500.3.3.1
* pkexec-debuginfo-121-150500.3.3.1
* typelib-1_0-Polkit-1_0-121-150500.3.3.1
* polkit-devel-debuginfo-121-150500.3.3.1
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* pkexec-121-150500.3.3.1
* openSUSE Leap 15.5 (x86_64)
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-32bit-121-150500.3.3.1
* libpolkit-gobject-1-0-32bit-121-150500.3.3.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.3.1
* openSUSE Leap 15.5 (noarch)
* polkit-doc-121-150500.3.3.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpolkit-gobject-1-0-64bit-121-150500.3.3.1
* libpolkit-gobject-1-0-64bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-64bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-64bit-121-150500.3.3.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* polkit-devel-121-150500.3.3.1
* pkexec-debuginfo-121-150500.3.3.1
* typelib-1_0-Polkit-1_0-121-150500.3.3.1
* polkit-devel-debuginfo-121-150500.3.3.1
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* pkexec-121-150500.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1209282
1
0
SUSE-SU-2024:1365-1: moderate: Security update for apache-commons-configuration2
by OPENSUSE-SECURITY-UPDATES 22 Apr '24
by OPENSUSE-SECURITY-UPDATES 22 Apr '24
22 Apr '24
# Security update for apache-commons-configuration2
Announcement ID: SUSE-SU-2024:1365-1
Rating: moderate
References:
* bsc#1221793
* bsc#1221797
Cross-References:
* CVE-2024-29131
* CVE-2024-29133
CVSS scores:
* CVE-2024-29131 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-29133 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for apache-commons-configuration2 fixes the following issues:
* CVE-2024-29131: Fixed StackOverflowError adding property in
AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
* CVE-2024-29133: Fixed StackOverflowError calling
ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
(bsc#1221793).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1365=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1365=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1365=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1365=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* apache-commons-configuration2-javadoc-2.10.1-150200.5.8.1
* Development Tools Module 15-SP5 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Enterprise Storage 7.1 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
## References:
* https://www.suse.com/security/cve/CVE-2024-29131.html
* https://www.suse.com/security/cve/CVE-2024-29133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221793
* https://bugzilla.suse.com/show_bug.cgi?id=1221797
1
0
22 Apr '24
# Security update for shim
Announcement ID: SUSE-SU-2024:1368-1
Rating: important
References:
* bsc#1198101
* bsc#1205588
* bsc#1205855
* bsc#1210382
* bsc#1213945
* bsc#1215098
* bsc#1215099
* bsc#1215100
* bsc#1215101
* bsc#1215102
* bsc#1215103
* bsc#1219460
* jsc#PED-922
Cross-References:
* CVE-2022-28737
* CVE-2023-40546
* CVE-2023-40547
* CVE-2023-40548
* CVE-2023-40549
* CVE-2023-40550
* CVE-2023-40551
CVSS scores:
* CVE-2022-28737 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28737 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-40546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40547 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-40548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-40549 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40550 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-40551 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves seven vulnerabilities, contains one feature and has five
security fixes can now be installed.
## Description:
This update for shim fixes the following issues:
* Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
* Limit the requirement of fde-tpm-helper-macros to the distro with
suse_version 1600 and above (bsc#1219460)
Update to version 15.8:
Security issues fixed:
* mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
* avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
* Fix integer overflow on SBAT section size on 32-bit system
(bsc#1215100,CVE-2023-40548)
* Authenticode: verify that the signature header is in bounds
(bsc#1215101,CVE-2023-40549)
* pe: Fix an out-of-bound read in verify_buffer_sbat()
(bsc#1215102,CVE-2023-40550)
* pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)
The NX flag is disable which is same as the default value of shim-15.8, hence,
not need to enable it by this patch now.
* Generate dbx during build so we don't include binary files in sources
* Don't require grub so shim can still be used with systemd-boot
* Update shim-install to fix boot failure of ext4 root file system on RAID10
(bsc#1205855)
* Adopt the macros from fde-tpm-helper-macros to update the signature in the
sealed key after a bootloader upgrade
* Update shim-install to amend full disk encryption support
* Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
* Use the long name to specify the grub2 key protector
* cryptodisk: support TPM authorized policies
* Do not use tpm_record_pcrs unless the command is in command.lst
* Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
enable the NX compatibility flag when using post-process-pe after discussed
with grub2 experts in mail. It's useful for further development and testing.
(bsc#1205588)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1368=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1368=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1368=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1368=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1368=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1368=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1368=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1368=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1368=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1368=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1368=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1368=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1368=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1368=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1368=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1368=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1368=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1368=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1368=1
## Package List:
* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* efitools-debugsource-1.9.2-150300.7.3.1
* efitools-debuginfo-1.9.2-150300.7.3.1
* efitools-1.9.2-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap 15.5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* Basesystem Module 15-SP5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Proxy 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Server 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
## References:
* https://www.suse.com/security/cve/CVE-2022-28737.html
* https://www.suse.com/security/cve/CVE-2023-40546.html
* https://www.suse.com/security/cve/CVE-2023-40547.html
* https://www.suse.com/security/cve/CVE-2023-40548.html
* https://www.suse.com/security/cve/CVE-2023-40549.html
* https://www.suse.com/security/cve/CVE-2023-40550.html
* https://www.suse.com/security/cve/CVE-2023-40551.html
* https://bugzilla.suse.com/show_bug.cgi?id=1198101
* https://bugzilla.suse.com/show_bug.cgi?id=1205588
* https://bugzilla.suse.com/show_bug.cgi?id=1205855
* https://bugzilla.suse.com/show_bug.cgi?id=1210382
* https://bugzilla.suse.com/show_bug.cgi?id=1213945
* https://bugzilla.suse.com/show_bug.cgi?id=1215098
* https://bugzilla.suse.com/show_bug.cgi?id=1215099
* https://bugzilla.suse.com/show_bug.cgi?id=1215100
* https://bugzilla.suse.com/show_bug.cgi?id=1215101
* https://bugzilla.suse.com/show_bug.cgi?id=1215102
* https://bugzilla.suse.com/show_bug.cgi?id=1215103
* https://bugzilla.suse.com/show_bug.cgi?id=1219460
* https://jira.suse.com/browse/PED-922
1
0
openSUSE-SU-2024:0112-1: moderate: Security update for perl-CryptX
by opensuse-security@opensuse.org 20 Apr '24
by opensuse-security@opensuse.org 20 Apr '24
20 Apr '24
openSUSE Security Update: Security update for perl-CryptX
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0112-1
Rating: moderate
References: #1221528
Cross-References: CVE-2018-25099
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for perl-CryptX fixes the following issues:
Updated to version 0.080:
0.080 2023-10-04
- fix #95 AES-NI troubles on MS Windows (gcc compiler)
- fix #96 Tests failure with Math::BigInt >= 1.999840
- Enabled AES-NI for platforms with gcc/clang/llvm 0.079
2023-10-01
- fix #92 update libtomcrypt
- bundled libtomcrypt update branch:develop (commit:1e629e6f
2023-06-22) 0.078 2023-04-28
- fix #89 Crypt::Mac::HMAC b64mac and b64umac object methods do
not work
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-112=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
perl-CryptX-0.80.0-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-25099.html
https://bugzilla.suse.com/1221528
1
0
openSUSE-SU-2024:0111-1: important: Security update for putty
by opensuse-security@opensuse.org 19 Apr '24
by opensuse-security@opensuse.org 19 Apr '24
19 Apr '24
openSUSE Security Update: Security update for putty
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0111-1
Rating: important
References:
Cross-References: CVE-2024-31497
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for putty fixes the following issues:
Update to release 0.81
* Fix CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no
longer generated with biased values of k. The previous bias compromises
private keys.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-111=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
putty-0.81-bp155.2.6.1
References:
https://www.suse.com/security/cve/CVE-2024-31497.html
1
0
SUSE-SU-2024:1347-1: important: Security update for wireshark
by OPENSUSE-SECURITY-UPDATES 19 Apr '24
by OPENSUSE-SECURITY-UPDATES 19 Apr '24
19 Apr '24
# Security update for wireshark
Announcement ID: SUSE-SU-2024:1347-1
Rating: important
References:
* bsc#1220181
Cross-References:
* CVE-2024-24476
CVSS scores:
* CVE-2024-24476 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for wireshark fixes the following issues:
Security fixes:
* CVE-2024-24476: Fixed a denial of service in ws_manuf_lookup_str()
(bsc#1220181)
Other fixes:
* Wireshark 3.6.22:
* Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.22.html
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1347=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1347=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1347=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1347=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1347=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1347=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1347=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1347=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Proxy 4.3 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
## References:
* https://www.suse.com/security/cve/CVE-2024-24476.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220181
1
0
SUSE-SU-2024:1350-1: important: Security update for MozillaFirefox
by OPENSUSE-SECURITY-UPDATES 19 Apr '24
by OPENSUSE-SECURITY-UPDATES 19 Apr '24
19 Apr '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:1350-1
Rating: important
References:
* bsc#1222535
Cross-References:
* CVE-2024-2609
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3854
* CVE-2024-3857
* CVE-2024-3859
* CVE-2024-3861
* CVE-2024-3863
* CVE-2024-3864
CVSS scores:
* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves nine vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 115.10.0 ESR (MSFA 2024-19)
(bsc#1222535):
* CVE-2024-3852: GetBoundName in the JIT returned the wrong object
* CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
* CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during
garbage collection
* CVE-2024-2609: Permission prompt input delay could expire when not in focus
* CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType
sanitizer
* CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
* CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on
Windows
* CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
* CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10,
and Thunderbird 115.10
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1350=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1350=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1350=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1350=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1350=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1350=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-branding-upstream-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222535
1
0