openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
June 2024
- 3 participants
- 87 discussions
28 Jun '24
# Security update for frr
Announcement ID: SUSE-SU-2024:2245-1
Rating: important
References:
* bsc#1216896
* bsc#1216897
* bsc#1216899
* bsc#1216900
Cross-References:
* CVE-2023-38406
* CVE-2023-38407
* CVE-2023-47234
* CVE-2023-47235
CVSS scores:
* CVE-2023-38406 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38406 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-38407 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38407 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47235 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47235 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves four vulnerabilities can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2023-38406: Fixed nlri length of zero mishandling, aka "flowspec
overflow". (bsc#1216900)
* CVE-2023-47235: Fixed a crash on malformed BGP UPDATE message with an EOR,
because the presence of EOR does not lead to a treat-as-withdraw outcome.
(bsc#1216896)
* CVE-2023-47234: Fixed a crash on crafted BGP UPDATE message with a
MP_UNREACH_NLRI attribute and additional NLRI data. (bsc#1216897)
* CVE-2023-38407: Fixed attempts to read beyond the end of the stream during
labeled unicast parsing. (bsc#1216899)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2245=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2245=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2245=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2245=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2245=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2245=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2245=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2245=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2245=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2245=1
## Package List:
* SUSE Manager Proxy 4.3 (x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
## References:
* https://www.suse.com/security/cve/CVE-2023-38406.html
* https://www.suse.com/security/cve/CVE-2023-38407.html
* https://www.suse.com/security/cve/CVE-2023-47234.html
* https://www.suse.com/security/cve/CVE-2023-47235.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216896
* https://bugzilla.suse.com/show_bug.cgi?id=1216897
* https://bugzilla.suse.com/show_bug.cgi?id=1216899
* https://bugzilla.suse.com/show_bug.cgi?id=1216900
1
0
25 Jun '24
# Security update for avahi
Announcement ID: SUSE-SU-2024:2200-1
Rating: moderate
References:
* bsc#1216594
* bsc#1216598
* bsc#1226586
Cross-References:
* CVE-2023-38469
* CVE-2023-38471
CVSS scores:
* CVE-2023-38469 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38469 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38471 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38471 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities and has one security fix can now be
installed.
## Description:
This update for avahi fixes the following issues:
* CVE-2023-38471: Fixed a reachable assertion in dbus_set_host_name.
(bsc#1216594)
* CVE-2023-38469: Fixed a reachable assertion in
avahi_dns_packet_append_record. (bsc#1216598)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2200=1 SUSE-2024-2200=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2200=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2200=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2200=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python3-avahi-0.8-150600.15.3.1
* libavahi-qt5-devel-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1
* libavahi-client3-0.8-150600.15.3.1
* libavahi-glib-devel-0.8-150600.15.3.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.3.1
* libdns_sd-debuginfo-0.8-150600.15.3.1
* avahi-autoipd-0.8-150600.15.3.1
* libavahi-gobject0-debuginfo-0.8-150600.15.3.1
* libavahi-gobject-devel-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* python3-avahi-gtk-0.8-150600.15.3.1
* libavahi-gobject0-0.8-150600.15.3.1
* libavahi-devel-0.8-150600.15.3.1
* avahi-0.8-150600.15.3.1
* libavahi-core7-0.8-150600.15.3.1
* libdns_sd-0.8-150600.15.3.1
* libavahi-common3-debuginfo-0.8-150600.15.3.1
* avahi-compat-howl-devel-0.8-150600.15.3.1
* libavahi-libevent1-0.8-150600.15.3.1
* avahi-utils-debuginfo-0.8-150600.15.3.1
* libavahi-qt5-1-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1
* libhowl0-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-0.8-150600.15.3.1
* avahi-utils-0.8-150600.15.3.1
* libavahi-glib1-debuginfo-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* libavahi-client3-debuginfo-0.8-150600.15.3.1
* libhowl0-debuginfo-0.8-150600.15.3.1
* libavahi-core7-debuginfo-0.8-150600.15.3.1
* libavahi-common3-0.8-150600.15.3.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.3.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.3.1
* avahi-autoipd-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-0.8-150600.15.3.1
* libavahi-libevent1-debuginfo-0.8-150600.15.3.1
* avahi-qt5-debugsource-0.8-150600.15.3.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1
* avahi-utils-gtk-0.8-150600.15.3.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.3.1
* avahi-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-32bit-0.8-150600.15.3.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-0.8-150600.15.3.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-common3-64bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-64bit-0.8-150600.15.3.1
* avahi-64bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-64bit-0.8-150600.15.3.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-64bit-0.8-150600.15.3.1
* libavahi-client3-64bit-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-debugsource-0.8-150600.15.3.1
* libavahi-client3-0.8-150600.15.3.1
* libavahi-glib-devel-0.8-150600.15.3.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.3.1
* libdns_sd-debuginfo-0.8-150600.15.3.1
* libavahi-gobject0-debuginfo-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* libavahi-gobject0-0.8-150600.15.3.1
* libavahi-devel-0.8-150600.15.3.1
* avahi-0.8-150600.15.3.1
* libavahi-core7-0.8-150600.15.3.1
* libdns_sd-0.8-150600.15.3.1
* libavahi-common3-debuginfo-0.8-150600.15.3.1
* avahi-compat-howl-devel-0.8-150600.15.3.1
* libavahi-libevent1-0.8-150600.15.3.1
* avahi-utils-debuginfo-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1
* libhowl0-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-0.8-150600.15.3.1
* avahi-utils-0.8-150600.15.3.1
* libavahi-glib1-debuginfo-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* libavahi-client3-debuginfo-0.8-150600.15.3.1
* libhowl0-debuginfo-0.8-150600.15.3.1
* libavahi-core7-debuginfo-0.8-150600.15.3.1
* libavahi-common3-0.8-150600.15.3.1
* libavahi-glib1-0.8-150600.15.3.1
* libavahi-libevent1-debuginfo-0.8-150600.15.3.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (noarch)
* avahi-lang-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (x86_64)
* avahi-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-client3-32bit-0.8-150600.15.3.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-autoipd-debuginfo-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* avahi-autoipd-0.8-150600.15.3.1
* avahi-utils-gtk-0.8-150600.15.3.1
* libavahi-gobject-devel-0.8-150600.15.3.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-debuginfo-0.8-150600.15.3.1
* python3-avahi-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1
## References:
* https://www.suse.com/security/cve/CVE-2023-38469.html
* https://www.suse.com/security/cve/CVE-2023-38471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216594
* https://bugzilla.suse.com/show_bug.cgi?id=1216598
* https://bugzilla.suse.com/show_bug.cgi?id=1226586
1
0
25 Jun '24
# Security update for wget
Announcement ID: SUSE-SU-2024:2201-1
Rating: moderate
References:
* bsc#1226419
Cross-References:
* CVE-2024-38428
CVSS scores:
* CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for wget fixes the following issues:
* CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a
URI. (bsc#1226419)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2201=1 openSUSE-SLE-15.6-2024-2201=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2201=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* wget-1.20.3-150600.19.3.1
* wget-debugsource-1.20.3-150600.19.3.1
* wget-debuginfo-1.20.3-150600.19.3.1
* openSUSE Leap 15.6 (noarch)
* wget-lang-1.20.3-150600.19.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wget-1.20.3-150600.19.3.1
* wget-debugsource-1.20.3-150600.19.3.1
* wget-debuginfo-1.20.3-150600.19.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38428.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226419
1
0
25 Jun '24
# Security update for hdf5
Announcement ID: SUSE-SU-2024:2195-1
Rating: important
References:
* bsc#1224158
Cross-References:
* CVE-2017-17507
* CVE-2018-11205
* CVE-2024-29158
* CVE-2024-29161
* CVE-2024-29166
* CVE-2024-32608
* CVE-2024-32610
* CVE-2024-32614
* CVE-2024-32619
* CVE-2024-32620
* CVE-2024-33873
* CVE-2024-33874
* CVE-2024-33875
CVSS scores:
* CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* HPC Module 15-SP5
* HPC Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves 13 vulnerabilities can now be installed.
## Description:
This update for hdf5 fixes the following issues:
* Fix bsc#1224158 - this fixes: CVE-2024-29158, CVE-2024-29161,
CVE-2024-29166, CVE-2024-32608, CVE-2024-32610, CVE-2024-32614,
CVE-2024-32619, CVE-2024-32620, CVE-2024-33873, CVE-2024-33874,
CVE-2024-33875 Additionally, these fixes resolve crashes triggered by the
reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be
unrelated to the original problems.
This update also ships several missing PackageHub packages for 15 SP5 and 15
SP6.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2195=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2195=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2195=1 openSUSE-SLE-15.5-2024-2195=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2195=1 SUSE-2024-2195=1
* HPC Module 15-SP5
zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-2195=1
* HPC Module 15-SP6
zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2024-2195=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2195=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2195=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2195=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2195=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2195=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2195=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2195=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2195=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* pmix-3.2.3-150300.3.10.1
* pmix-test-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* pmix-debugsource-3.2.3-150300.3.10.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libpmix2-3.2.3-150300.3.10.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* pmix-plugins-3.2.3-150300.3.10.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* openSUSE Leap 15.3 (noarch)
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* openSUSE Leap 15.4 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* openmpi4-debugsource-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* openmpi4-devel-4.1.4-150500.3.2.1
* openmpi4-devel-debuginfo-4.1.4-150500.3.2.1
* mpich-ofi-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mpich-ofi-debugsource-4.0.2-150500.3.2.1
* openmpi4-libs-debuginfo-4.1.4-150500.3.2.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-debuginfo-4.0.2-150500.3.2.1
* mvapich2-devel-static-2.3.7-150500.3.2.1
* mvapich2-debugsource-2.3.7-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* openmpi4-config-4.1.4-150500.3.2.1
* mpich-ofi-devel-4.0.2-150500.3.2.1
* openmpi4-debuginfo-4.1.4-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-2.3.7-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-debugsource-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* mpich-devel-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mvapich2-debuginfo-2.3.7-150500.3.2.1
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* openmpi4-docs-4.1.4-150500.3.2.1
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mvapich2-devel-2.3.7-150500.3.2.1
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* openmpi4-4.1.4-150500.3.2.1
* openmpi4-macros-devel-4.1.4-150500.3.2.1
* openmpi4-libs-4.1.4-150500.3.2.1
* mvapich2-doc-2.3.7-150500.3.2.1
* mpich-4.0.2-150500.3.2.1
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi-debuginfo-4.0.2-150500.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* openSUSE Leap 15.5 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi4-testsuite-4.1.4-150500.3.2.1
* mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* openSUSE Leap 15.5 (x86_64 i586)
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm-devel-static-2.3.7-150500.3.2.1
* openSUSE Leap 15.5 (x86_64)
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* openmpi4-libs-32bit-debuginfo-4.1.4-150500.3.2.1
* openmpi4-libs-32bit-4.1.4-150500.3.2.1
* mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm2-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* openmpi4-libs-64bit-debuginfo-4.1.4-150500.3.2.1
* openmpi4-libs-64bit-4.1.4-150500.3.2.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* lua51-luaposix-34.1.1-150200.3.5.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-0.07-150000.5.5.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* lua51-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua51-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mpich-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-debugsource-2.3.7-150600.9.2.1
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* openmpi4-docs-4.1.6-150600.3.2.1
* openmpi4-libs-debuginfo-4.1.6-150600.3.2.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-ofi-debugsource-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-debugsource-4.1.2-150600.3.2.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* openmpi4-config-4.1.6-150600.3.2.1
* openmpi4-macros-devel-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-devel-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mpich-devel-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-debuginfo-4.1.6-150600.3.2.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* openmpi4-debugsource-4.1.6-150600.3.2.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-devel-static-2.3.7-150600.9.2.1
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-debuginfo-4.1.2-150600.3.2.1
* mpich-ofi-4.1.2-150600.3.2.1
* mpich-ofi-devel-4.1.2-150600.3.2.1
* mvapich2-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* openmpi4-devel-debuginfo-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-ofi-debuginfo-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* openmpi4-libs-4.1.6-150600.3.2.1
* mvapich2-doc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-debuginfo-2.3.7-150600.9.2.1
* openmpi4-4.1.6-150600.3.2.1
* openmpi4-devel-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (noarch)
* mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-testsuite-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-testsuite-4.1.6-150600.3.2.1
* openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1
* openSUSE Leap 15.6 (x86_64)
* mvapich2-psm2-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* openmpi4-libs-32bit-4.1.6-150600.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150600.9.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mvapich2-psm-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-doc-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* openmpi4-libs-32bit-debuginfo-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* openmpi4-libs-64bit-debuginfo-4.1.6-150600.3.2.1
* openmpi4-libs-64bit-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* lua51-luaposix-34.1.1-150200.3.5.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-0.07-150000.5.5.1
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* lua51-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua51-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* HPC Module 15-SP5 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* HPC Module 15-SP5 (aarch64 x86_64)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* HPC Module 15-SP5 (x86_64)
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* pmix-devel-3.2.3-150300.3.10.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1
* HPC Module 15-SP6 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* HPC Module 15-SP6 (aarch64 x86_64)
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* pmix-plugins-3.2.3-150300.3.10.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* pmix-debugsource-3.2.3-150300.3.10.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* HPC Module 15-SP6 (x86_64)
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* pmix-devel-3.2.3-150300.3.10.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1
* SUSE Package Hub 15 15-SP5 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Package Hub 15 15-SP6 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Package Hub 15 15-SP6 (ppc64le s390x)
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* pmix-plugins-3.2.3-150300.3.10.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* pmix-debugsource-3.2.3-150300.3.10.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openmpi4-debugsource-4.1.4-150500.3.2.1
* openmpi4-libs-debuginfo-4.1.4-150500.3.2.1
* openmpi4-devel-4.1.4-150500.3.2.1
* openmpi4-devel-debuginfo-4.1.4-150500.3.2.1
* mpich-ofi-4.0.2-150500.3.2.1
* mpich-ofi-debugsource-4.0.2-150500.3.2.1
* mpich-debuginfo-4.0.2-150500.3.2.1
* openmpi4-config-4.1.4-150500.3.2.1
* mvapich2-devel-static-2.3.7-150500.3.2.1
* mvapich2-debugsource-2.3.7-150500.3.2.1
* mpich-ofi-devel-4.0.2-150500.3.2.1
* openmpi4-debuginfo-4.1.4-150500.3.2.1
* mvapich2-2.3.7-150500.3.2.1
* mpich-debugsource-4.0.2-150500.3.2.1
* mpich-devel-4.0.2-150500.3.2.1
* mvapich2-debuginfo-2.3.7-150500.3.2.1
* openmpi4-docs-4.1.4-150500.3.2.1
* mvapich2-devel-2.3.7-150500.3.2.1
* openmpi4-4.1.4-150500.3.2.1
* openmpi4-libs-4.1.4-150500.3.2.1
* mpich-4.0.2-150500.3.2.1
* mpich-ofi-debuginfo-4.0.2-150500.3.2.1
* mvapich2-doc-2.3.7-150500.3.2.1
* Server Applications Module 15-SP5 (x86_64)
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mpich-4.1.2-150600.3.2.1
* openmpi4-docs-4.1.6-150600.3.2.1
* openmpi4-libs-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi-debugsource-4.1.2-150600.3.2.1
* mpich-debugsource-4.1.2-150600.3.2.1
* openmpi4-config-4.1.6-150600.3.2.1
* mvapich2-devel-2.3.7-150600.9.2.1
* mpich-devel-4.1.2-150600.3.2.1
* openmpi4-debuginfo-4.1.6-150600.3.2.1
* openmpi4-debugsource-4.1.6-150600.3.2.1
* mvapich2-devel-static-2.3.7-150600.9.2.1
* mpich-debuginfo-4.1.2-150600.3.2.1
* mpich-ofi-4.1.2-150600.3.2.1
* mpich-ofi-devel-4.1.2-150600.3.2.1
* mvapich2-2.3.7-150600.9.2.1
* openmpi4-devel-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi-debuginfo-4.1.2-150600.3.2.1
* openmpi4-libs-4.1.6-150600.3.2.1
* mvapich2-doc-2.3.7-150600.9.2.1
* mvapich2-debugsource-2.3.7-150600.9.2.1
* mvapich2-debuginfo-2.3.7-150600.9.2.1
* openmpi4-4.1.6-150600.3.2.1
* openmpi4-devel-4.1.6-150600.3.2.1
* Server Applications Module 15-SP6 (x86_64)
* mvapich2-psm2-2.3.7-150600.9.2.1
* mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-debugsource-2.3.7-150600.9.2.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* lua53-luaposix-34.1.1-150200.3.5.1
* lua53-luaterm-0.07-150000.5.5.1
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* luaposix-doc-34.1.1-150200.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pmix-plugin-munge-3.2.3-150300.3.10.1
* lua53-luaterm-0.07-150000.5.5.1
* pmix-plugins-3.2.3-150300.3.10.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* pmix-3.2.3-150300.3.10.1
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libpmix2-3.2.3-150300.3.10.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* lua53-luaposix-34.1.1-150200.3.5.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* pmix-test-3.2.3-150300.3.10.1
* pmix-debugsource-3.2.3-150300.3.10.1
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-headers-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-headers-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1
## References:
* https://www.suse.com/security/cve/CVE-2017-17507.html
* https://www.suse.com/security/cve/CVE-2018-11205.html
* https://www.suse.com/security/cve/CVE-2024-29158.html
* https://www.suse.com/security/cve/CVE-2024-29161.html
* https://www.suse.com/security/cve/CVE-2024-29166.html
* https://www.suse.com/security/cve/CVE-2024-32608.html
* https://www.suse.com/security/cve/CVE-2024-32610.html
* https://www.suse.com/security/cve/CVE-2024-32614.html
* https://www.suse.com/security/cve/CVE-2024-32619.html
* https://www.suse.com/security/cve/CVE-2024-32620.html
* https://www.suse.com/security/cve/CVE-2024-33873.html
* https://www.suse.com/security/cve/CVE-2024-33874.html
* https://www.suse.com/security/cve/CVE-2024-33875.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224158
1
0
SUSE-SU-2024:2198-1: important: Security update for ghostscript
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
25 Jun '24
# Security update for ghostscript
Announcement ID: SUSE-SU-2024:2198-1
Rating: important
References:
* bsc#1225491
Cross-References:
* CVE-2024-33871
CVSS scores:
* CVE-2024-33871 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for ghostscript fixes the following issues:
* CVE-2024-33871: Prevent OPVP device arbitrary code execution via custom
Driver library. (bsc#1225491)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2198=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2198=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2198=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2198=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2198=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2198=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2198=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2198=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2198=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2198=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2198=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2198=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2198=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2198=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2198=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2198=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2198=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2198=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2198=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Proxy 4.3 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
## References:
* https://www.suse.com/security/cve/CVE-2024-33871.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225491
1
0
SUSE-SU-2024:2189-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
25 Jun '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2189-1
Rating: important
References:
* bsc#1065729
* bsc#1174585
* bsc#1190569
* bsc#1191949
* bsc#1192107
* bsc#1193983
* bsc#1194288
* bsc#1194869
* bsc#1196869
* bsc#1196956
* bsc#1197915
* bsc#1200313
* bsc#1201308
* bsc#1201489
* bsc#1208149
* bsc#1209657
* bsc#1209799
* bsc#1209834
* bsc#1210335
* bsc#1211592
* bsc#1213863
* bsc#1216702
* bsc#1217169
* bsc#1217515
* bsc#1218447
* bsc#1218917
* bsc#1220492
* bsc#1220783
* bsc#1221044
* bsc#1221645
* bsc#1221958
* bsc#1222011
* bsc#1222559
* bsc#1222619
* bsc#1222721
* bsc#1222976
* bsc#1223057
* bsc#1223084
* bsc#1223111
* bsc#1223138
* bsc#1223191
* bsc#1223384
* bsc#1223390
* bsc#1223481
* bsc#1223501
* bsc#1223505
* bsc#1223512
* bsc#1223520
* bsc#1223532
* bsc#1223626
* bsc#1223715
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223952
* bsc#1223953
* bsc#1223957
* bsc#1223962
* bsc#1223963
* bsc#1223964
* bsc#1223996
* bsc#1224085
* bsc#1224099
* bsc#1224137
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224488
* bsc#1224494
* bsc#1224511
* bsc#1224592
* bsc#1224611
* bsc#1224664
* bsc#1224678
* bsc#1224682
* bsc#1224685
* bsc#1224730
* bsc#1224736
* bsc#1224763
* bsc#1224816
* bsc#1224895
* bsc#1224898
* bsc#1224900
* bsc#1224901
* bsc#1224902
* bsc#1224903
* bsc#1224904
* bsc#1224905
* bsc#1224907
* bsc#1224909
* bsc#1224910
* bsc#1224911
* bsc#1224912
* bsc#1224913
* bsc#1224914
* bsc#1224915
* bsc#1224920
* bsc#1224928
* bsc#1224931
* bsc#1224932
* bsc#1224937
* bsc#1224942
* bsc#1224944
* bsc#1224945
* bsc#1224947
* bsc#1224956
* bsc#1224988
* bsc#1225000
* bsc#1225003
* bsc#1225005
* bsc#1225009
* bsc#1225022
* bsc#1225031
* bsc#1225032
* bsc#1225036
* bsc#1225044
* bsc#1225076
* bsc#1225077
* bsc#1225082
* bsc#1225086
* bsc#1225092
* bsc#1225095
* bsc#1225096
* bsc#1225106
* bsc#1225108
* bsc#1225109
* bsc#1225118
* bsc#1225121
* bsc#1225122
* bsc#1225123
* bsc#1225125
* bsc#1225126
* bsc#1225127
* bsc#1225129
* bsc#1225131
* bsc#1225132
* bsc#1225145
* bsc#1225151
* bsc#1225153
* bsc#1225156
* bsc#1225158
* bsc#1225160
* bsc#1225161
* bsc#1225164
* bsc#1225167
* bsc#1225180
* bsc#1225183
* bsc#1225184
* bsc#1225186
* bsc#1225187
* bsc#1225189
* bsc#1225190
* bsc#1225191
* bsc#1225192
* bsc#1225193
* bsc#1225195
* bsc#1225198
* bsc#1225201
* bsc#1225203
* bsc#1225205
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225209
* bsc#1225210
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225225
* bsc#1225227
* bsc#1225228
* bsc#1225229
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225235
* bsc#1225236
* bsc#1225237
* bsc#1225238
* bsc#1225239
* bsc#1225240
* bsc#1225241
* bsc#1225242
* bsc#1225243
* bsc#1225244
* bsc#1225245
* bsc#1225246
* bsc#1225247
* bsc#1225248
* bsc#1225249
* bsc#1225250
* bsc#1225251
* bsc#1225252
* bsc#1225253
* bsc#1225254
* bsc#1225255
* bsc#1225256
* bsc#1225257
* bsc#1225258
* bsc#1225259
* bsc#1225260
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225268
* bsc#1225301
* bsc#1225303
* bsc#1225304
* bsc#1225306
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225323
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225329
* bsc#1225330
* bsc#1225331
* bsc#1225332
* bsc#1225333
* bsc#1225334
* bsc#1225335
* bsc#1225336
* bsc#1225337
* bsc#1225338
* bsc#1225339
* bsc#1225341
* bsc#1225342
* bsc#1225344
* bsc#1225346
* bsc#1225347
* bsc#1225351
* bsc#1225353
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225368
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225373
* bsc#1225374
* bsc#1225375
* bsc#1225376
* bsc#1225377
* bsc#1225379
* bsc#1225380
* bsc#1225383
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225388
* bsc#1225390
* bsc#1225392
* bsc#1225393
* bsc#1225396
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225410
* bsc#1225411
* bsc#1225425
* bsc#1225427
* bsc#1225431
* bsc#1225435
* bsc#1225436
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225441
* bsc#1225445
* bsc#1225446
* bsc#1225447
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225461
* bsc#1225463
* bsc#1225464
* bsc#1225466
* bsc#1225471
* bsc#1225472
* bsc#1225478
* bsc#1225479
* bsc#1225482
* bsc#1225483
* bsc#1225486
* bsc#1225488
* bsc#1225490
* bsc#1225492
* bsc#1225495
* bsc#1225499
* bsc#1225500
* bsc#1225501
* bsc#1225508
* bsc#1225510
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225549
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225565
* bsc#1225566
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225577
* bsc#1225583
* bsc#1225584
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225595
* bsc#1225599
* jsc#PED-8111
Cross-References:
* CVE-2020-36788
* CVE-2021-39698
* CVE-2021-4148
* CVE-2021-43056
* CVE-2021-47358
* CVE-2021-47359
* CVE-2021-47360
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47363
* CVE-2021-47364
* CVE-2021-47365
* CVE-2021-47366
* CVE-2021-47367
* CVE-2021-47368
* CVE-2021-47369
* CVE-2021-47370
* CVE-2021-47371
* CVE-2021-47372
* CVE-2021-47373
* CVE-2021-47374
* CVE-2021-47375
* CVE-2021-47376
* CVE-2021-47378
* CVE-2021-47379
* CVE-2021-47380
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47384
* CVE-2021-47385
* CVE-2021-47386
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47389
* CVE-2021-47390
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47394
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47397
* CVE-2021-47398
* CVE-2021-47399
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47402
* CVE-2021-47403
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47406
* CVE-2021-47407
* CVE-2021-47408
* CVE-2021-47409
* CVE-2021-47410
* CVE-2021-47412
* CVE-2021-47413
* CVE-2021-47414
* CVE-2021-47415
* CVE-2021-47416
* CVE-2021-47417
* CVE-2021-47418
* CVE-2021-47419
* CVE-2021-47420
* CVE-2021-47421
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47427
* CVE-2021-47428
* CVE-2021-47429
* CVE-2021-47430
* CVE-2021-47431
* CVE-2021-47433
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47437
* CVE-2021-47438
* CVE-2021-47439
* CVE-2021-47440
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47446
* CVE-2021-47447
* CVE-2021-47448
* CVE-2021-47449
* CVE-2021-47450
* CVE-2021-47451
* CVE-2021-47452
* CVE-2021-47453
* CVE-2021-47454
* CVE-2021-47455
* CVE-2021-47456
* CVE-2021-47457
* CVE-2021-47458
* CVE-2021-47459
* CVE-2021-47460
* CVE-2021-47461
* CVE-2021-47462
* CVE-2021-47463
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47466
* CVE-2021-47467
* CVE-2021-47468
* CVE-2021-47469
* CVE-2021-47470
* CVE-2021-47471
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47474
* CVE-2021-47475
* CVE-2021-47476
* CVE-2021-47477
* CVE-2021-47478
* CVE-2021-47479
* CVE-2021-47480
* CVE-2021-47481
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47484
* CVE-2021-47485
* CVE-2021-47486
* CVE-2021-47488
* CVE-2021-47489
* CVE-2021-47490
* CVE-2021-47491
* CVE-2021-47492
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47510
* CVE-2021-47511
* CVE-2021-47513
* CVE-2021-47514
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47520
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47524
* CVE-2021-47525
* CVE-2021-47526
* CVE-2021-47527
* CVE-2021-47528
* CVE-2021-47529
* CVE-2021-47533
* CVE-2021-47534
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47537
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47544
* CVE-2021-47549
* CVE-2021-47550
* CVE-2021-47551
* CVE-2021-47553
* CVE-2021-47554
* CVE-2021-47556
* CVE-2021-47558
* CVE-2021-47559
* CVE-2021-47560
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47564
* CVE-2021-47565
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48652
* CVE-2022-48662
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48699
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2022-48708
* CVE-2022-48709
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2860
* CVE-2023-47233
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52676
* CVE-2023-52686
* CVE-2023-52690
* CVE-2023-52702
* CVE-2023-52703
* CVE-2023-52707
* CVE-2023-52708
* CVE-2023-52730
* CVE-2023-52733
* CVE-2023-52736
* CVE-2023-52738
* CVE-2023-52739
* CVE-2023-52740
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52743
* CVE-2023-52744
* CVE-2023-52745
* CVE-2023-52747
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52756
* CVE-2023-52759
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52766
* CVE-2023-52774
* CVE-2023-52781
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52814
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52844
* CVE-2023-52847
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52858
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-0639
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26828
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26862
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35863
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35895
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35914
* CVE-2024-36926
CVSS scores:
* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 320 vulnerabilities, contains one feature and has 20
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763).
* CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678).
* CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
(bsc#1222011).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
* CVE-2024-35904: Avoid dereference of garbage after mount failure
(bsc#1224494).
* CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223057).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* filemap: remove use of wait bookmarks (bsc#1224085).
* idpf: extend tx watchdog timeout (bsc#1224137).
* ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/powernv: Add a null pointer check in opal_event_init()
(bsc#1065729).
* powerpc/powernv: Add a null pointer check to scom_debug_init_one()
(bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2189=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2189=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2189=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2189=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2189=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2189=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2189=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2189=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2189=1
## Package List:
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-docs-html-5.14.21-150400.24.122.2
* kernel-source-vanilla-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-livepatch-devel-5.14.21-150400.24.122.2
* kernel-debug-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-debug-debugsource-5.14.21-150400.24.122.2
* kernel-debug-devel-5.14.21-150400.24.122.2
* kernel-debug-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.122.2
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.122.2
* kernel-kvmsmall-devel-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-rebuild-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-debugsource-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* dlm-kmp-default-5.14.21-150400.24.122.2
* kernel-default-optional-5.14.21-150400.24.122.2
* kernel-obs-qa-5.14.21-150400.24.122.1
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-optional-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kselftests-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64)
* dtb-socionext-5.14.21-150400.24.122.1
* dtb-allwinner-5.14.21-150400.24.122.1
* kernel-64kb-devel-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-5.14.21-150400.24.122.2
* dtb-rockchip-5.14.21-150400.24.122.1
* dtb-hisilicon-5.14.21-150400.24.122.1
* dtb-qcom-5.14.21-150400.24.122.1
* dtb-apple-5.14.21-150400.24.122.1
* dtb-sprd-5.14.21-150400.24.122.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-5.14.21-150400.24.122.2
* dtb-nvidia-5.14.21-150400.24.122.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-exynos-5.14.21-150400.24.122.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.122.2
* dtb-amazon-5.14.21-150400.24.122.1
* kernel-64kb-extra-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-optional-5.14.21-150400.24.122.2
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-broadcom-5.14.21-150400.24.122.1
* dtb-freescale-5.14.21-150400.24.122.1
* dtb-cavium-5.14.21-150400.24.122.1
* dtb-altera-5.14.21-150400.24.122.1
* dtb-xilinx-5.14.21-150400.24.122.1
* dtb-amd-5.14.21-150400.24.122.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-mediatek-5.14.21-150400.24.122.1
* dtb-amlogic-5.14.21-150400.24.122.1
* dtb-apm-5.14.21-150400.24.122.1
* dlm-kmp-64kb-5.14.21-150400.24.122.2
* dtb-arm-5.14.21-150400.24.122.1
* ocfs2-kmp-64kb-5.14.21-150400.24.122.2
* dtb-lg-5.14.21-150400.24.122.1
* dtb-renesas-5.14.21-150400.24.122.1
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* dtb-marvell-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-obs-build-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
## References:
* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-4148.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47358.html
* https://www.suse.com/security/cve/CVE-2021-47359.html
* https://www.suse.com/security/cve/CVE-2021-47360.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47363.html
* https://www.suse.com/security/cve/CVE-2021-47364.html
* https://www.suse.com/security/cve/CVE-2021-47365.html
* https://www.suse.com/security/cve/CVE-2021-47366.html
* https://www.suse.com/security/cve/CVE-2021-47367.html
* https://www.suse.com/security/cve/CVE-2021-47368.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47370.html
* https://www.suse.com/security/cve/CVE-2021-47371.html
* https://www.suse.com/security/cve/CVE-2021-47372.html
* https://www.suse.com/security/cve/CVE-2021-47373.html
* https://www.suse.com/security/cve/CVE-2021-47374.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47376.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47379.html
* https://www.suse.com/security/cve/CVE-2021-47380.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47384.html
* https://www.suse.com/security/cve/CVE-2021-47385.html
* https://www.suse.com/security/cve/CVE-2021-47386.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47389.html
* https://www.suse.com/security/cve/CVE-2021-47390.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47394.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47398.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47406.html
* https://www.suse.com/security/cve/CVE-2021-47407.html
* https://www.suse.com/security/cve/CVE-2021-47408.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47410.html
* https://www.suse.com/security/cve/CVE-2021-47412.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47414.html
* https://www.suse.com/security/cve/CVE-2021-47415.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47417.html
* https://www.suse.com/security/cve/CVE-2021-47418.html
* https://www.suse.com/security/cve/CVE-2021-47419.html
* https://www.suse.com/security/cve/CVE-2021-47420.html
* https://www.suse.com/security/cve/CVE-2021-47421.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47427.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47429.html
* https://www.suse.com/security/cve/CVE-2021-47430.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47433.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47437.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47439.html
* https://www.suse.com/security/cve/CVE-2021-47440.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47446.html
* https://www.suse.com/security/cve/CVE-2021-47447.html
* https://www.suse.com/security/cve/CVE-2021-47448.html
* https://www.suse.com/security/cve/CVE-2021-47449.html
* https://www.suse.com/security/cve/CVE-2021-47450.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47452.html
* https://www.suse.com/security/cve/CVE-2021-47453.html
* https://www.suse.com/security/cve/CVE-2021-47454.html
* https://www.suse.com/security/cve/CVE-2021-47455.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47457.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47459.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47461.html
* https://www.suse.com/security/cve/CVE-2021-47462.html
* https://www.suse.com/security/cve/CVE-2021-47463.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47466.html
* https://www.suse.com/security/cve/CVE-2021-47467.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47470.html
* https://www.suse.com/security/cve/CVE-2021-47471.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47474.html
* https://www.suse.com/security/cve/CVE-2021-47475.html
* https://www.suse.com/security/cve/CVE-2021-47476.html
* https://www.suse.com/security/cve/CVE-2021-47477.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47479.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47481.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47484.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47486.html
* https://www.suse.com/security/cve/CVE-2021-47488.html
* https://www.suse.com/security/cve/CVE-2021-47489.html
* https://www.suse.com/security/cve/CVE-2021-47490.html
* https://www.suse.com/security/cve/CVE-2021-47491.html
* https://www.suse.com/security/cve/CVE-2021-47492.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47510.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47513.html
* https://www.suse.com/security/cve/CVE-2021-47514.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47520.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47524.html
* https://www.suse.com/security/cve/CVE-2021-47525.html
* https://www.suse.com/security/cve/CVE-2021-47526.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47528.html
* https://www.suse.com/security/cve/CVE-2021-47529.html
* https://www.suse.com/security/cve/CVE-2021-47533.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47537.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47544.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47550.html
* https://www.suse.com/security/cve/CVE-2021-47551.html
* https://www.suse.com/security/cve/CVE-2021-47553.html
* https://www.suse.com/security/cve/CVE-2021-47554.html
* https://www.suse.com/security/cve/CVE-2021-47556.html
* https://www.suse.com/security/cve/CVE-2021-47558.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47560.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47564.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48709.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52702.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52707.html
* https://www.suse.com/security/cve/CVE-2023-52708.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52733.html
* https://www.suse.com/security/cve/CVE-2023-52736.html
* https://www.suse.com/security/cve/CVE-2023-52738.html
* https://www.suse.com/security/cve/CVE-2023-52739.html
* https://www.suse.com/security/cve/CVE-2023-52740.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52744.html
* https://www.suse.com/security/cve/CVE-2023-52745.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1190569
* https://bugzilla.suse.com/show_bug.cgi?id=1191949
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1193983
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196869
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201308
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1208149
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1213863
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217515
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221958
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://bugzilla.suse.com/show_bug.cgi?id=1224085
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224895
* https://bugzilla.suse.com/show_bug.cgi?id=1224898
* https://bugzilla.suse.com/show_bug.cgi?id=1224900
* https://bugzilla.suse.com/show_bug.cgi?id=1224901
* https://bugzilla.suse.com/show_bug.cgi?id=1224902
* https://bugzilla.suse.com/show_bug.cgi?id=1224903
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224905
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224910
* https://bugzilla.suse.com/show_bug.cgi?id=1224911
* https://bugzilla.suse.com/show_bug.cgi?id=1224912
* https://bugzilla.suse.com/show_bug.cgi?id=1224913
* https://bugzilla.suse.com/show_bug.cgi?id=1224914
* https://bugzilla.suse.com/show_bug.cgi?id=1224915
* https://bugzilla.suse.com/show_bug.cgi?id=1224920
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224945
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224956
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225005
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225032
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225095
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225118
* https://bugzilla.suse.com/show_bug.cgi?id=1225121
* https://bugzilla.suse.com/show_bug.cgi?id=1225122
* https://bugzilla.suse.com/show_bug.cgi?id=1225123
* https://bugzilla.suse.com/show_bug.cgi?id=1225125
* https://bugzilla.suse.com/show_bug.cgi?id=1225126
* https://bugzilla.suse.com/show_bug.cgi?id=1225127
* https://bugzilla.suse.com/show_bug.cgi?id=1225129
* https://bugzilla.suse.com/show_bug.cgi?id=1225131
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225145
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225156
* https://bugzilla.suse.com/show_bug.cgi?id=1225158
* https://bugzilla.suse.com/show_bug.cgi?id=1225160
* https://bugzilla.suse.com/show_bug.cgi?id=1225161
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225167
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225183
* https://bugzilla.suse.com/show_bug.cgi?id=1225184
* https://bugzilla.suse.com/show_bug.cgi?id=1225186
* https://bugzilla.suse.com/show_bug.cgi?id=1225187
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225190
* https://bugzilla.suse.com/show_bug.cgi?id=1225191
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225195
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225203
* https://bugzilla.suse.com/show_bug.cgi?id=1225205
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225209
* https://bugzilla.suse.com/show_bug.cgi?id=1225210
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225225
* https://bugzilla.suse.com/show_bug.cgi?id=1225227
* https://bugzilla.suse.com/show_bug.cgi?id=1225228
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225235
* https://bugzilla.suse.com/show_bug.cgi?id=1225236
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225239
* https://bugzilla.suse.com/show_bug.cgi?id=1225240
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225245
* https://bugzilla.suse.com/show_bug.cgi?id=1225246
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225248
* https://bugzilla.suse.com/show_bug.cgi?id=1225249
* https://bugzilla.suse.com/show_bug.cgi?id=1225250
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225253
* https://bugzilla.suse.com/show_bug.cgi?id=1225254
* https://bugzilla.suse.com/show_bug.cgi?id=1225255
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225257
* https://bugzilla.suse.com/show_bug.cgi?id=1225258
* https://bugzilla.suse.com/show_bug.cgi?id=1225259
* https://bugzilla.suse.com/show_bug.cgi?id=1225260
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225268
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225304
* https://bugzilla.suse.com/show_bug.cgi?id=1225306
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225323
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225331
* https://bugzilla.suse.com/show_bug.cgi?id=1225332
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225334
* https://bugzilla.suse.com/show_bug.cgi?id=1225335
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225337
* https://bugzilla.suse.com/show_bug.cgi?id=1225338
* https://bugzilla.suse.com/show_bug.cgi?id=1225339
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225342
* https://bugzilla.suse.com/show_bug.cgi?id=1225344
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225353
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225368
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225373
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225375
* https://bugzilla.suse.com/show_bug.cgi?id=1225376
* https://bugzilla.suse.com/show_bug.cgi?id=1225377
* https://bugzilla.suse.com/show_bug.cgi?id=1225379
* https://bugzilla.suse.com/show_bug.cgi?id=1225380
* https://bugzilla.suse.com/show_bug.cgi?id=1225383
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225388
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225392
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225410
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225425
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225431
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225436
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225441
* https://bugzilla.suse.com/show_bug.cgi?id=1225445
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225463
* https://bugzilla.suse.com/show_bug.cgi?id=1225464
* https://bugzilla.suse.com/show_bug.cgi?id=1225466
* https://bugzilla.suse.com/show_bug.cgi?id=1225471
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225483
* https://bugzilla.suse.com/show_bug.cgi?id=1225486
* https://bugzilla.suse.com/show_bug.cgi?id=1225488
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225492
* https://bugzilla.suse.com/show_bug.cgi?id=1225495
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225501
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225510
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://jira.suse.com/browse/PED-8111
1
0
SUSE-SU-2024:2185-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
25 Jun '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2185-1
Rating: important
References:
* bsc#1065729
* bsc#1151927
* bsc#1152472
* bsc#1154353
* bsc#1156395
* bsc#1174585
* bsc#1176447
* bsc#1176774
* bsc#1176869
* bsc#1178134
* bsc#1181147
* bsc#1184631
* bsc#1185570
* bsc#1185589
* bsc#1185902
* bsc#1186885
* bsc#1187357
* bsc#1188616
* bsc#1188772
* bsc#1189883
* bsc#1190795
* bsc#1191452
* bsc#1192107
* bsc#1194288
* bsc#1194591
* bsc#1196956
* bsc#1197760
* bsc#1198029
* bsc#1199304
* bsc#1200619
* bsc#1203389
* bsc#1206646
* bsc#1209657
* bsc#1210335
* bsc#1210629
* bsc#1213476
* bsc#1215420
* bsc#1216702
* bsc#1217169
* bsc#1220137
* bsc#1220144
* bsc#1220754
* bsc#1220877
* bsc#1220960
* bsc#1221044
* bsc#1221113
* bsc#1221829
* bsc#1222251
* bsc#1222619
* bsc#1222838
* bsc#1222867
* bsc#1223084
* bsc#1223138
* bsc#1223384
* bsc#1223390
* bsc#1223512
* bsc#1223932
* bsc#1223934
* bsc#1224099
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224511
* bsc#1224592
* bsc#1224816
* bsc#1224826
* bsc#1224830
* bsc#1224831
* bsc#1224832
* bsc#1224834
* bsc#1224841
* bsc#1224842
* bsc#1224843
* bsc#1224844
* bsc#1224846
* bsc#1224849
* bsc#1224852
* bsc#1224853
* bsc#1224854
* bsc#1224859
* bsc#1224882
* bsc#1224886
* bsc#1224888
* bsc#1224889
* bsc#1224891
* bsc#1224892
* bsc#1224893
* bsc#1224899
* bsc#1224904
* bsc#1224907
* bsc#1224909
* bsc#1224916
* bsc#1224917
* bsc#1224922
* bsc#1224923
* bsc#1224924
* bsc#1224926
* bsc#1224928
* bsc#1224953
* bsc#1224954
* bsc#1224955
* bsc#1224957
* bsc#1224961
* bsc#1224963
* bsc#1224965
* bsc#1224966
* bsc#1224968
* bsc#1224981
* bsc#1224982
* bsc#1224983
* bsc#1224984
* bsc#1224987
* bsc#1224990
* bsc#1224993
* bsc#1224996
* bsc#1224997
* bsc#1225026
* bsc#1225030
* bsc#1225058
* bsc#1225060
* bsc#1225083
* bsc#1225084
* bsc#1225091
* bsc#1225112
* bsc#1225113
* bsc#1225128
* bsc#1225140
* bsc#1225143
* bsc#1225148
* bsc#1225155
* bsc#1225164
* bsc#1225177
* bsc#1225178
* bsc#1225181
* bsc#1225192
* bsc#1225193
* bsc#1225198
* bsc#1225201
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225237
* bsc#1225238
* bsc#1225243
* bsc#1225244
* bsc#1225247
* bsc#1225251
* bsc#1225252
* bsc#1225256
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225301
* bsc#1225303
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225330
* bsc#1225333
* bsc#1225336
* bsc#1225341
* bsc#1225346
* bsc#1225351
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225374
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225390
* bsc#1225393
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225411
* bsc#1225424
* bsc#1225427
* bsc#1225435
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225446
* bsc#1225447
* bsc#1225448
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225468
* bsc#1225499
* bsc#1225500
* bsc#1225508
* bsc#1225534
Cross-References:
* CVE-2020-36788
* CVE-2021-3743
* CVE-2021-39698
* CVE-2021-43056
* CVE-2021-47104
* CVE-2021-47192
* CVE-2021-47200
* CVE-2021-47220
* CVE-2021-47227
* CVE-2021-47228
* CVE-2021-47229
* CVE-2021-47230
* CVE-2021-47231
* CVE-2021-47235
* CVE-2021-47236
* CVE-2021-47237
* CVE-2021-47239
* CVE-2021-47240
* CVE-2021-47241
* CVE-2021-47246
* CVE-2021-47252
* CVE-2021-47253
* CVE-2021-47254
* CVE-2021-47255
* CVE-2021-47258
* CVE-2021-47259
* CVE-2021-47260
* CVE-2021-47261
* CVE-2021-47263
* CVE-2021-47265
* CVE-2021-47267
* CVE-2021-47269
* CVE-2021-47270
* CVE-2021-47274
* CVE-2021-47275
* CVE-2021-47276
* CVE-2021-47280
* CVE-2021-47281
* CVE-2021-47284
* CVE-2021-47285
* CVE-2021-47288
* CVE-2021-47289
* CVE-2021-47296
* CVE-2021-47301
* CVE-2021-47302
* CVE-2021-47305
* CVE-2021-47307
* CVE-2021-47308
* CVE-2021-47314
* CVE-2021-47315
* CVE-2021-47320
* CVE-2021-47321
* CVE-2021-47323
* CVE-2021-47324
* CVE-2021-47329
* CVE-2021-47330
* CVE-2021-47332
* CVE-2021-47333
* CVE-2021-47334
* CVE-2021-47337
* CVE-2021-47338
* CVE-2021-47340
* CVE-2021-47341
* CVE-2021-47343
* CVE-2021-47344
* CVE-2021-47347
* CVE-2021-47348
* CVE-2021-47350
* CVE-2021-47353
* CVE-2021-47354
* CVE-2021-47356
* CVE-2021-47369
* CVE-2021-47375
* CVE-2021-47378
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47399
* CVE-2021-47402
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47409
* CVE-2021-47413
* CVE-2021-47416
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47428
* CVE-2021-47431
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47451
* CVE-2021-47456
* CVE-2021-47458
* CVE-2021-47460
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47468
* CVE-2021-47473
* CVE-2021-47478
* CVE-2021-47480
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47485
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47511
* CVE-2021-47512
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47527
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47538
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47549
* CVE-2021-47557
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47565
* CVE-2022-1195
* CVE-2022-20132
* CVE-2022-48636
* CVE-2022-48673
* CVE-2022-48704
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2176
* CVE-2023-424
* CVE-2023-4244
* CVE-2023-47233
* CVE-2023-52433
* CVE-2023-52581
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52686
* CVE-2023-52840
* CVE-2023-52871
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-26581
* CVE-2024-26643
* CVE-2024-26828
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35895
* CVE-2024-35914
CVSS scores:
* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47329 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 187 vulnerabilities and has 26 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225201).
* CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
* CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
(bsc#1225355).
* CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
(bsc#1225208).
* CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
* CVE-2023-52840: Fix use after free in rmi_unregister_function()
(bsc#1224928).
* CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
* CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* cifs: add missing spinlock around tcon refcount (bsc#1213476).
* cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
* cifs: avoid race conditions with parallel reconnects (bsc#1213476).
* cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
* cifs: avoid use of global locks for high contention data (bsc#1213476).
* cifs: check only tcon status on tcon related functions (bsc#1213476).
* cifs: do all necessary checks for credits within or before locking
(bsc#1213476).
* cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
* cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
* cifs: do not take exclusive lock for updating target hints (bsc#1213476).
* cifs: fix confusing debug message (bsc#1213476).
* cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
* cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
* cifs: fix refresh of cached referrals (bsc#1213476).
* cifs: fix return of uninitialized rc in dfs_cache_update_tgthint()
(bsc#1213476).
* cifs: fix source pathname comparison of dfs supers (bsc#1213476).
* cifs: fix status checks in cifs_tree_connect (bsc#1213476).
* cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
* cifs: get rid of dns resolve worker (bsc#1213476).
* cifs: get rid of mount options string parsing (bsc#1213476).
* cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
* cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
* cifs: match even the scope id for ipv6 addresses (bsc#1213476).
* cifs: optimize reconnect of nested links (bsc#1213476).
* cifs: prevent data race in smb2_reconnect() (bsc#1213476).
* cifs: refresh root referrals (bsc#1213476).
* cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
* cifs: remove unused function (bsc#1213476).
* cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
* cifs: return DFS root session id in DebugData (bsc#1213476).
* cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
* cifs: set correct ipc status after initial tree connect (bsc#1213476).
* cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
* cifs: set correct tcon status after initial tree connect (bsc#1213476).
* cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
* cifs: set resolved ip in sockaddr (bsc#1213476).
* cifs: share dfs connections and supers (bsc#1213476).
* cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
* cifs: use fs_context for automounts (bsc#1213476).
* cifs: use origin fullpath for automounts (bsc#1213476).
* cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
* netfilter: nf_tables: defer gc run if previous batch is still pending (git-
fixes).
* netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path (git-fixes).
* netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
* netfilter: nf_tables: fix memleak when more than 255 elements expired (git-
fixes).
* netfilter: nf_tables: GC transaction race with abort path (git-fixes).
* netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
* netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
* netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout (git-fixes).
* netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-
fixes).
* netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
(git-fixes).
* netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
* netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
* netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
fixes).
* netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
* netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named
sets (git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match
(git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
* netfilter: nft_set_rbtree: Do not account for expired elements on insertion
(git-fixes).
* netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on
insertion (git-fixes).
* netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
* netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
* netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap
detection (git-fixes).
* netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start()
(git-fixes).
* netfilter: nft_set_rbtree: overlap detection with element re-addition after
deletion (git-fixes).
* netfilter: nft_set_rbtree: skip elements in transaction from garbage
collection (git-fixes).
* netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
* netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
(git-fixes).
* netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
(git-fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* NFC: nxp: add NXP1002 (bsc#1185589).
* PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
* smb: client: fix dfs link mount against w2k8 (git-fixes).
* smb: client: fix null auth (bsc#1213476).
* smb: client: set correct id, uid and cruid for multiuser automounts (git-
fixes).
* x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2185=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2185=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (noarch)
* kernel-macros-5.3.18-150300.59.164.1
* kernel-source-5.3.18-150300.59.164.1
* kernel-source-vanilla-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* kernel-docs-html-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.164.1
* kernel-debug-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-5.3.18-150300.59.164.1
* kernel-debug-devel-5.3.18-150300.59.164.1
* kernel-debug-livepatch-devel-5.3.18-150300.59.164.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1
* kernel-debug-debugsource-5.3.18-150300.59.164.1
* kernel-debug-debuginfo-5.3.18-150300.59.164.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-build-5.3.18-150300.59.164.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* cluster-md-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-livepatch-devel-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* dlm-kmp-default-5.3.18-150300.59.164.1
* kernel-default-livepatch-5.3.18-150300.59.164.1
* kernel-default-extra-5.3.18-150300.59.164.1
* kernel-default-optional-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* kselftests-kmp-default-5.3.18-150300.59.164.1
* gfs2-kmp-default-5.3.18-150300.59.164.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.164.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-qa-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* cluster-md-kmp-preempt-5.3.18-150300.59.164.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* ocfs2-kmp-preempt-5.3.18-150300.59.164.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* gfs2-kmp-preempt-5.3.18-150300.59.164.1
* kselftests-kmp-preempt-5.3.18-150300.59.164.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-optional-5.3.18-150300.59.164.1
* kernel-preempt-extra-5.3.18-150300.59.164.1
* dlm-kmp-preempt-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1
* reiserfs-kmp-preempt-5.3.18-150300.59.164.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64)
* dtb-rockchip-5.3.18-150300.59.164.1
* dtb-sprd-5.3.18-150300.59.164.1
* dtb-hisilicon-5.3.18-150300.59.164.1
* dtb-arm-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1
* reiserfs-kmp-64kb-5.3.18-150300.59.164.1
* dtb-freescale-5.3.18-150300.59.164.1
* kernel-64kb-optional-5.3.18-150300.59.164.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-apm-5.3.18-150300.59.164.1
* dtb-exynos-5.3.18-150300.59.164.1
* dtb-socionext-5.3.18-150300.59.164.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* dtb-amd-5.3.18-150300.59.164.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-qcom-5.3.18-150300.59.164.1
* dtb-marvell-5.3.18-150300.59.164.1
* dtb-mediatek-5.3.18-150300.59.164.1
* dtb-altera-5.3.18-150300.59.164.1
* dtb-broadcom-5.3.18-150300.59.164.1
* dtb-zte-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* ocfs2-kmp-64kb-5.3.18-150300.59.164.1
* kselftests-kmp-64kb-5.3.18-150300.59.164.1
* dlm-kmp-64kb-5.3.18-150300.59.164.1
* gfs2-kmp-64kb-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* dtb-cavium-5.3.18-150300.59.164.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-renesas-5.3.18-150300.59.164.1
* dtb-xilinx-5.3.18-150300.59.164.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* cluster-md-kmp-64kb-5.3.18-150300.59.164.1
* kernel-64kb-extra-5.3.18-150300.59.164.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-nvidia-5.3.18-150300.59.164.1
* dtb-amlogic-5.3.18-150300.59.164.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1
* dtb-al-5.3.18-150300.59.164.1
* dtb-lg-5.3.18-150300.59.164.1
* dtb-allwinner-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-livepatch-devel-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
* kernel-default-livepatch-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-default-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* cluster-md-kmp-default-5.3.18-150300.59.164.1
* gfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* kernel-default-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
## References:
* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-3743.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47220.html
* https://www.suse.com/security/cve/CVE-2021-47227.html
* https://www.suse.com/security/cve/CVE-2021-47228.html
* https://www.suse.com/security/cve/CVE-2021-47229.html
* https://www.suse.com/security/cve/CVE-2021-47230.html
* https://www.suse.com/security/cve/CVE-2021-47231.html
* https://www.suse.com/security/cve/CVE-2021-47235.html
* https://www.suse.com/security/cve/CVE-2021-47236.html
* https://www.suse.com/security/cve/CVE-2021-47237.html
* https://www.suse.com/security/cve/CVE-2021-47239.html
* https://www.suse.com/security/cve/CVE-2021-47240.html
* https://www.suse.com/security/cve/CVE-2021-47241.html
* https://www.suse.com/security/cve/CVE-2021-47246.html
* https://www.suse.com/security/cve/CVE-2021-47252.html
* https://www.suse.com/security/cve/CVE-2021-47253.html
* https://www.suse.com/security/cve/CVE-2021-47254.html
* https://www.suse.com/security/cve/CVE-2021-47255.html
* https://www.suse.com/security/cve/CVE-2021-47258.html
* https://www.suse.com/security/cve/CVE-2021-47259.html
* https://www.suse.com/security/cve/CVE-2021-47260.html
* https://www.suse.com/security/cve/CVE-2021-47261.html
* https://www.suse.com/security/cve/CVE-2021-47263.html
* https://www.suse.com/security/cve/CVE-2021-47265.html
* https://www.suse.com/security/cve/CVE-2021-47267.html
* https://www.suse.com/security/cve/CVE-2021-47269.html
* https://www.suse.com/security/cve/CVE-2021-47270.html
* https://www.suse.com/security/cve/CVE-2021-47274.html
* https://www.suse.com/security/cve/CVE-2021-47275.html
* https://www.suse.com/security/cve/CVE-2021-47276.html
* https://www.suse.com/security/cve/CVE-2021-47280.html
* https://www.suse.com/security/cve/CVE-2021-47281.html
* https://www.suse.com/security/cve/CVE-2021-47284.html
* https://www.suse.com/security/cve/CVE-2021-47285.html
* https://www.suse.com/security/cve/CVE-2021-47288.html
* https://www.suse.com/security/cve/CVE-2021-47289.html
* https://www.suse.com/security/cve/CVE-2021-47296.html
* https://www.suse.com/security/cve/CVE-2021-47301.html
* https://www.suse.com/security/cve/CVE-2021-47302.html
* https://www.suse.com/security/cve/CVE-2021-47305.html
* https://www.suse.com/security/cve/CVE-2021-47307.html
* https://www.suse.com/security/cve/CVE-2021-47308.html
* https://www.suse.com/security/cve/CVE-2021-47314.html
* https://www.suse.com/security/cve/CVE-2021-47315.html
* https://www.suse.com/security/cve/CVE-2021-47320.html
* https://www.suse.com/security/cve/CVE-2021-47321.html
* https://www.suse.com/security/cve/CVE-2021-47323.html
* https://www.suse.com/security/cve/CVE-2021-47324.html
* https://www.suse.com/security/cve/CVE-2021-47329.html
* https://www.suse.com/security/cve/CVE-2021-47330.html
* https://www.suse.com/security/cve/CVE-2021-47332.html
* https://www.suse.com/security/cve/CVE-2021-47333.html
* https://www.suse.com/security/cve/CVE-2021-47334.html
* https://www.suse.com/security/cve/CVE-2021-47337.html
* https://www.suse.com/security/cve/CVE-2021-47338.html
* https://www.suse.com/security/cve/CVE-2021-47340.html
* https://www.suse.com/security/cve/CVE-2021-47341.html
* https://www.suse.com/security/cve/CVE-2021-47343.html
* https://www.suse.com/security/cve/CVE-2021-47344.html
* https://www.suse.com/security/cve/CVE-2021-47347.html
* https://www.suse.com/security/cve/CVE-2021-47348.html
* https://www.suse.com/security/cve/CVE-2021-47350.html
* https://www.suse.com/security/cve/CVE-2021-47353.html
* https://www.suse.com/security/cve/CVE-2021-47354.html
* https://www.suse.com/security/cve/CVE-2021-47356.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47512.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47538.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-1195.html
* https://www.suse.com/security/cve/CVE-2022-20132.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-424.html
* https://www.suse.com/security/cve/CVE-2023-4244.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1151927
* https://bugzilla.suse.com/show_bug.cgi?id=1152472
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1176447
* https://bugzilla.suse.com/show_bug.cgi?id=1176774
* https://bugzilla.suse.com/show_bug.cgi?id=1176869
* https://bugzilla.suse.com/show_bug.cgi?id=1178134
* https://bugzilla.suse.com/show_bug.cgi?id=1181147
* https://bugzilla.suse.com/show_bug.cgi?id=1184631
* https://bugzilla.suse.com/show_bug.cgi?id=1185570
* https://bugzilla.suse.com/show_bug.cgi?id=1185589
* https://bugzilla.suse.com/show_bug.cgi?id=1185902
* https://bugzilla.suse.com/show_bug.cgi?id=1186885
* https://bugzilla.suse.com/show_bug.cgi?id=1187357
* https://bugzilla.suse.com/show_bug.cgi?id=1188616
* https://bugzilla.suse.com/show_bug.cgi?id=1188772
* https://bugzilla.suse.com/show_bug.cgi?id=1189883
* https://bugzilla.suse.com/show_bug.cgi?id=1190795
* https://bugzilla.suse.com/show_bug.cgi?id=1191452
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194591
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197760
* https://bugzilla.suse.com/show_bug.cgi?id=1198029
* https://bugzilla.suse.com/show_bug.cgi?id=1199304
* https://bugzilla.suse.com/show_bug.cgi?id=1200619
* https://bugzilla.suse.com/show_bug.cgi?id=1203389
* https://bugzilla.suse.com/show_bug.cgi?id=1206646
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1213476
* https://bugzilla.suse.com/show_bug.cgi?id=1215420
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1220754
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221113
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224826
* https://bugzilla.suse.com/show_bug.cgi?id=1224830
* https://bugzilla.suse.com/show_bug.cgi?id=1224831
* https://bugzilla.suse.com/show_bug.cgi?id=1224832
* https://bugzilla.suse.com/show_bug.cgi?id=1224834
* https://bugzilla.suse.com/show_bug.cgi?id=1224841
* https://bugzilla.suse.com/show_bug.cgi?id=1224842
* https://bugzilla.suse.com/show_bug.cgi?id=1224843
* https://bugzilla.suse.com/show_bug.cgi?id=1224844
* https://bugzilla.suse.com/show_bug.cgi?id=1224846
* https://bugzilla.suse.com/show_bug.cgi?id=1224849
* https://bugzilla.suse.com/show_bug.cgi?id=1224852
* https://bugzilla.suse.com/show_bug.cgi?id=1224853
* https://bugzilla.suse.com/show_bug.cgi?id=1224854
* https://bugzilla.suse.com/show_bug.cgi?id=1224859
* https://bugzilla.suse.com/show_bug.cgi?id=1224882
* https://bugzilla.suse.com/show_bug.cgi?id=1224886
* https://bugzilla.suse.com/show_bug.cgi?id=1224888
* https://bugzilla.suse.com/show_bug.cgi?id=1224889
* https://bugzilla.suse.com/show_bug.cgi?id=1224891
* https://bugzilla.suse.com/show_bug.cgi?id=1224892
* https://bugzilla.suse.com/show_bug.cgi?id=1224893
* https://bugzilla.suse.com/show_bug.cgi?id=1224899
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224916
* https://bugzilla.suse.com/show_bug.cgi?id=1224917
* https://bugzilla.suse.com/show_bug.cgi?id=1224922
* https://bugzilla.suse.com/show_bug.cgi?id=1224923
* https://bugzilla.suse.com/show_bug.cgi?id=1224924
* https://bugzilla.suse.com/show_bug.cgi?id=1224926
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224953
* https://bugzilla.suse.com/show_bug.cgi?id=1224954
* https://bugzilla.suse.com/show_bug.cgi?id=1224955
* https://bugzilla.suse.com/show_bug.cgi?id=1224957
* https://bugzilla.suse.com/show_bug.cgi?id=1224961
* https://bugzilla.suse.com/show_bug.cgi?id=1224963
* https://bugzilla.suse.com/show_bug.cgi?id=1224965
* https://bugzilla.suse.com/show_bug.cgi?id=1224966
* https://bugzilla.suse.com/show_bug.cgi?id=1224968
* https://bugzilla.suse.com/show_bug.cgi?id=1224981
* https://bugzilla.suse.com/show_bug.cgi?id=1224982
* https://bugzilla.suse.com/show_bug.cgi?id=1224983
* https://bugzilla.suse.com/show_bug.cgi?id=1224984
* https://bugzilla.suse.com/show_bug.cgi?id=1224987
* https://bugzilla.suse.com/show_bug.cgi?id=1224990
* https://bugzilla.suse.com/show_bug.cgi?id=1224993
* https://bugzilla.suse.com/show_bug.cgi?id=1224996
* https://bugzilla.suse.com/show_bug.cgi?id=1224997
* https://bugzilla.suse.com/show_bug.cgi?id=1225026
* https://bugzilla.suse.com/show_bug.cgi?id=1225030
* https://bugzilla.suse.com/show_bug.cgi?id=1225058
* https://bugzilla.suse.com/show_bug.cgi?id=1225060
* https://bugzilla.suse.com/show_bug.cgi?id=1225083
* https://bugzilla.suse.com/show_bug.cgi?id=1225084
* https://bugzilla.suse.com/show_bug.cgi?id=1225091
* https://bugzilla.suse.com/show_bug.cgi?id=1225112
* https://bugzilla.suse.com/show_bug.cgi?id=1225113
* https://bugzilla.suse.com/show_bug.cgi?id=1225128
* https://bugzilla.suse.com/show_bug.cgi?id=1225140
* https://bugzilla.suse.com/show_bug.cgi?id=1225143
* https://bugzilla.suse.com/show_bug.cgi?id=1225148
* https://bugzilla.suse.com/show_bug.cgi?id=1225155
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225177
* https://bugzilla.suse.com/show_bug.cgi?id=1225178
* https://bugzilla.suse.com/show_bug.cgi?id=1225181
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225424
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225448
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
1
0
SUSE-SU-2024:1530-2: moderate: Security update for grafana and mybatis
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
by OPENSUSE-SECURITY-UPDATES 25 Jun '24
25 Jun '24
# Security update for grafana and mybatis
Announcement ID: SUSE-SU-2024:1530-2
Rating: moderate
References:
* bsc#1219912
* bsc#1222155
* jsc#MSQA-760
Cross-References:
* CVE-2023-6152
* CVE-2024-1313
CVSS scores:
* CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities and contains one feature can now be
installed.
## Description:
This update for grafana and mybatis fixes the following issues:
grafana was updated to version 9.5.18:
* Grafana now requires Go 1.20
* Security issues fixed:
* CVE-2024-1313: Require same organisation when deleting snapshots
(bsc#1222155)
* CVE-2023-6152: Add email verification when updating user email (bsc#1219912)
* Other non-security related changes:
* Version 9.5.17:
* [FEATURE] Alerting: Backport use Alertmanager API v2
* Version 9.5.16:
* [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL
* Version 9.5.15:
* [FEATURE] Alerting: Attempt to retry retryable errors
* Version 9.5.14:
* [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error
* [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied
* [BUGFIX] LDAP: Fix enable users on successfull login
* Version 9.5.13:
* [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder
* [BUGFIX] Licensing: Pass func to update env variables when starting plugin
* Version 9.5.12:
* [FEATURE] Azure: Add support for Workload Identity authentication
* Version 9.5.9:
* [FEATURE] SSE: Fix DSNode to not panic when response has empty response
* [FEATURE] Prometheus: Handle the response with different field key order
* [BUGFIX] LDAP: Fix user disabling
mybatis:
* `apache-commons-ognl` is now a non-optional dependency
* Fixed building with log4j v1 and v2 dependencies
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1530=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1530=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* mybatis-javadoc-3.5.6-150200.5.6.1
* mybatis-3.5.6-150200.5.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* grafana-9.5.18-150200.3.56.1
* grafana-debuginfo-9.5.18-150200.3.56.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* grafana-9.5.18-150200.3.56.1
* grafana-debuginfo-9.5.18-150200.3.56.1
## References:
* https://www.suse.com/security/cve/CVE-2023-6152.html
* https://www.suse.com/security/cve/CVE-2024-1313.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219912
* https://bugzilla.suse.com/show_bug.cgi?id=1222155
* https://jira.suse.com/browse/MSQA-760
1
0
24 Jun '24
# Security update for vte
Announcement ID: SUSE-SU-2024:2180-1
Rating: important
References:
* bsc#1226134
Cross-References:
* CVE-2024-37535
CVSS scores:
* CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for vte fixes the following issues:
* CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of
service (memory consumption) via a window resize escape. (bsc#1226134)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2180=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2180=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2180=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2180=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2180=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2180=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2180=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2180=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2180=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2180=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2180=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2180=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Manager Proxy 4.3 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-tools-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* glade-catalog-vte-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* vte-tools-debuginfo-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-tools-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* glade-catalog-vte-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* vte-tools-debuginfo-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.5 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* Desktop Applications Module 15-SP5 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
## References:
* https://www.suse.com/security/cve/CVE-2024-37535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226134
1
0
SUSE-SU-2024:2170-1: important: Security update for gnome-settings-daemon
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
24 Jun '24
# Security update for gnome-settings-daemon
Announcement ID: SUSE-SU-2024:2170-1
Rating: important
References:
* bsc#1226423
Cross-References:
* CVE-2024-38394
CVSS scores:
* CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for gnome-settings-daemon fixes the following issues:
* CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy
(bsc#1226423).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2170=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2170=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2170=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2170=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2170=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* openSUSE Leap 15.4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226423
1
0
SUSE-SU-2024:2171-1: important: Security update for libarchive
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
24 Jun '24
# Security update for libarchive
Announcement ID: SUSE-SU-2024:2171-1
Rating: important
References:
* bsc#1225971
Cross-References:
* CVE-2024-20696
CVSS scores:
* CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for libarchive fixes the following issues:
* CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2171=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2171=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2171=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2171=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2171=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2171=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2171=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2171=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2171=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2171=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2171=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2171=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2171=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2171=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2171=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.4 (x86_64)
* libarchive13-32bit-3.5.1-150400.3.15.1
* libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libarchive13-64bit-3.5.1-150400.3.15.1
* libarchive13-64bit-debuginfo-3.5.1-150400.3.15.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.5 (x86_64)
* libarchive13-32bit-3.5.1-150400.3.15.1
* libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Proxy 4.3 (x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-20696.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225971
1
0
SUSE-SU-2024:2168-1: important: Security update for gnome-settings-daemon
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
by OPENSUSE-SECURITY-UPDATES 24 Jun '24
24 Jun '24
# Security update for gnome-settings-daemon
Announcement ID: SUSE-SU-2024:2168-1
Rating: important
References:
* bsc#1226423
Cross-References:
* CVE-2024-38394
CVSS scores:
* CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for gnome-settings-daemon fixes the following issues:
* CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy
(bsc#1226423).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2168=1 SUSE-2024-2168=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2168=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* gnome-settings-daemon-debugsource-41.0-150500.4.3.1
* gnome-settings-daemon-devel-41.0-150500.4.3.1
* gnome-settings-daemon-41.0-150500.4.3.1
* gnome-settings-daemon-debuginfo-41.0-150500.4.3.1
* openSUSE Leap 15.5 (noarch)
* gnome-settings-daemon-lang-41.0-150500.4.3.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gnome-settings-daemon-debugsource-41.0-150500.4.3.1
* gnome-settings-daemon-devel-41.0-150500.4.3.1
* gnome-settings-daemon-41.0-150500.4.3.1
* gnome-settings-daemon-debuginfo-41.0-150500.4.3.1
* Desktop Applications Module 15-SP5 (noarch)
* gnome-settings-daemon-lang-41.0-150500.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226423
1
0
24 Jun '24
# Security update for wget
Announcement ID: SUSE-SU-2024:2174-1
Rating: moderate
References:
* bsc#1226419
Cross-References:
* CVE-2024-38428
CVSS scores:
* CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for wget fixes the following issues:
* CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a
URI. (bsc#1226419)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2174=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2174=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2174=1
## Package List:
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1
* openSUSE Leap 15.5 (noarch)
* wget-lang-1.20.3-150000.3.20.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38428.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226419
1
0
22 Jun '24
# Security update for vte
Announcement ID: SUSE-SU-2024:2153-1
Rating: important
References:
* bsc#1226134
Cross-References:
* CVE-2024-37535
CVSS scores:
* CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for vte fixes the following issues:
* CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of
service (memory consumption) via a window resize escape. (bsc#1226134)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2153=1 SUSE-2024-2153=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2153=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2153=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1
* typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1
* libvte-2_91-0-0.74.2-150600.3.3.1
* vte-tools-gtk4-0.74.2-150600.3.3.1
* vte-devel-0.74.2-150600.3.3.1
* vte-tools-0.74.2-150600.3.3.1
* libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-tools-debuginfo-0.74.2-150600.3.3.1
* vte-tools-gtk4-debuginfo-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* vte-lang-0.74.2-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1
* libvte-2_91-0-0.74.2-150600.3.3.1
* libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-devel-0.74.2-150600.3.3.1
* typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* Desktop Applications Module 15-SP6 (noarch)
* vte-lang-0.74.2-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-37535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226134
1
0
21 Jun '24
# Security update for podofo
Announcement ID: SUSE-SU-2024:2137-1
Rating: moderate
References:
* bsc#1127514
* bsc#1127855
* bsc#1131544
Cross-References:
* CVE-2018-20797
* CVE-2019-10723
* CVE-2019-9199
CVSS scores:
* CVE-2018-20797 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2018-20797 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-10723 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-10723 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-9199 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2019-9199 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for podofo fixes the following issues:
* CVE-2019-9199: Fixed a NULL pointer dereference in podofoimpose
(bsc#1127855)
* CVE-2018-20797: Fixed an excessive memory allocation in PoDoFo:podofo_calloc
(bsc#1127514)
* CVE-2019-10723: Fixed a memory leak in PdfPagesTreeCache (bsc#1131544)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2137=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2137=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2137=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2137=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2137=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2018-20797.html
* https://www.suse.com/security/cve/CVE-2019-10723.html
* https://www.suse.com/security/cve/CVE-2019-9199.html
* https://bugzilla.suse.com/show_bug.cgi?id=1127514
* https://bugzilla.suse.com/show_bug.cgi?id=1127855
* https://bugzilla.suse.com/show_bug.cgi?id=1131544
1
0
SUSE-SU-2024:2138-1: moderate: Security update for python-cryptography
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
21 Jun '24
# Security update for python-cryptography
Announcement ID: SUSE-SU-2024:2138-1
Rating: moderate
References:
* bsc#1220210
Cross-References:
* CVE-2024-26130
CVSS scores:
* CVE-2024-26130 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-cryptography fixes the following issues:
* CVE-2024-26130: Fix a NULL pointer dereference in
pkcs12.serialize_key_and_certificates(). (bsc#1220210)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2138=1 openSUSE-SLE-15.6-2024-2138=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2138=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-cryptography-41.0.3-150600.23.3.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-cryptography-41.0.3-150600.23.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-26130.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220210
1
0
SUSE-SU-2024:2106-1: important: Security update for php-composer2
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
21 Jun '24
# Security update for php-composer2
Announcement ID: SUSE-SU-2024:2106-1
Rating: important
References:
* bsc#1226181
* bsc#1226182
Cross-References:
* CVE-2024-35241
* CVE-2024-35242
CVSS scores:
* CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for php-composer2 fixes the following issues:
* CVE-2024-35241: Fixed code execution when installing packages in repository
with specially crafted branch names (bsc#1226181).
* CVE-2024-35242: Fixed command injection via specially crafted branch names
during repository cloning (bsc#1226182).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2106=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2106=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2106=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2106=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2106=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2106=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2106=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2106=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* openSUSE Leap 15.5 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* Web and Scripting Module 15-SP5 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Manager Server 4.3 (noarch)
* php-composer2-2.2.3-150400.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-35241.html
* https://www.suse.com/security/cve/CVE-2024-35242.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226181
* https://bugzilla.suse.com/show_bug.cgi?id=1226182
1
0
SUSE-SU-2024:2107-1: important: Security update for php-composer2
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
by OPENSUSE-SECURITY-UPDATES 21 Jun '24
21 Jun '24
# Security update for php-composer2
Announcement ID: SUSE-SU-2024:2107-1
Rating: important
References:
* bsc#1226181
* bsc#1226182
Cross-References:
* CVE-2024-35241
* CVE-2024-35242
CVSS scores:
* CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* Web and Scripting Module 15-SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for php-composer2 fixes the following issues:
* CVE-2024-35241: Fixed code execution when installing packages in repository
with specially crafted branch names (bsc#1226181).
* CVE-2024-35242: Fixed command injection via specially crafted branch names
during repository cloning (bsc#1226182).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2107=1 openSUSE-SLE-15.6-2024-2107=1
* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2107=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* php-composer2-2.6.4-150600.3.3.1
* Web and Scripting Module 15-SP6 (noarch)
* php-composer2-2.6.4-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-35241.html
* https://www.suse.com/security/cve/CVE-2024-35242.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226181
* https://bugzilla.suse.com/show_bug.cgi?id=1226182
1
0
20 Jun '24
# Security update for opencc
Announcement ID: SUSE-SU-2024:2102-1
Rating: moderate
References:
* bsc#1108310
Cross-References:
* CVE-2018-16982
CVSS scores:
* CVE-2018-16982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2018-16982 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-16982 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for opencc fixes the following issues:
* CVE-2018-16982: Check offset bounds in BinaryDict::NewFromFile method.
(bsc#1108310)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2102=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2102=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2102=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* opencc-data-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1
* opencc-devel-1.0.5-150000.5.3.1
* libopencc2-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* opencc-data-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1
* opencc-devel-1.0.5-150000.5.3.1
* libopencc2-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libopencc2-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1
## References:
* https://www.suse.com/security/cve/CVE-2018-16982.html
* https://bugzilla.suse.com/show_bug.cgi?id=1108310
1
0
SUSE-SU-2024:2088-1: important: Security update for openssl-3
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
19 Jun '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:2088-1
Rating: important
References:
* bsc#1225551
Cross-References:
* CVE-2024-4741
CVSS scores:
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2088=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2088=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2088=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2088=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2088=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2088=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2088=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2088=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2088=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2088=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2088=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.57.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.57.1
* libopenssl3-32bit-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.57.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.57.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.57.1
* openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Proxy 4.3 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
1
0
19 Jun '24
# Security update for podman
Announcement ID: SUSE-SU-2024:2090-1
Rating: important
References:
* bsc#1224122
* bsc#1226136
Cross-References:
* CVE-2024-24786
* CVE-2024-3727
CVSS scores:
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for podman fixes the following issues:
* Update to version 4.9.5
* CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected
authenticated registry accesses on behalf of a victim user, causing resource
exhaustion, local path traversal, and other attacks. (bsc#1224122)
* CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2090=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2090=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2090=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2090=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2090=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2090=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2090=1
## Package List:
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* podman-remote-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podmansh-4.9.5-150400.4.27.1
* openSUSE Leap 15.4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
## References:
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224122
* https://bugzilla.suse.com/show_bug.cgi?id=1226136
1
0
SUSE-SU-2024:2089-1: important: Security update for openssl-1_1
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
19 Jun '24
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2024:2089-1
Rating: important
References:
* bsc#1225551
Cross-References:
* CVE-2024-4741
CVSS scores:
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2089=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2089=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2089=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2089=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2089=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2089=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2089=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2089=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2089=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2089=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2089=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (noarch)
* openssl-1_1-doc-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl-1_1-devel-64bit-1.1.1l-150400.7.69.1
* libopenssl1_1-64bit-1.1.1l-150400.7.69.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-64bit-1.1.1l-150400.7.69.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Proxy 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Manager Server 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
1
0
openSUSE-SU-2024:0052-1: moderate: Security update for bitcoin
by opensuse-securityďĽ opensuse.org 19 Jun '24
by opensuse-securityďĽ opensuse.org 19 Jun '24
19 Jun '24
openSUSE Security Update: Security update for bitcoin
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0052-1
Rating: moderate
References:
Cross-References: CVE-2018-17144
CVSS scores:
CVE-2018-17144 (NVD) : 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2018-17144 (SUSE): 7.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for bitcoin fixes the following issues:
Update to version 26.0, including the following changes:
- Enable LTO and test package for Leap
- Enable sqlite3 support for wallet
- Enable asm optimizations unconditionally
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-52=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le s390x x86_64):
bitcoin-qt5-26.0-bp155.2.3.1
bitcoin-test-26.0-bp155.2.3.1
bitcoin-utils-26.0-bp155.2.3.1
bitcoind-26.0-bp155.2.3.1
libbitcoinconsensus-devel-26.0-bp155.2.3.1
libbitcoinconsensus0-26.0-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-17144.html
2
1
SUSE-SU-2024:2077-1: important: Security update for gdk-pixbuf
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
19 Jun '24
# Security update for gdk-pixbuf
Announcement ID: SUSE-SU-2024:2077-1
Rating: important
References:
* bsc#1195391
* bsc#1219276
* bsc#1223903
Cross-References:
* CVE-2022-48622
CVSS scores:
* CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for gdk-pixbuf fixes the following issues:
gdk-pixbuf was updated to version 2.42.12:
* Security issues fixed:
* CVE-2022-48622: Fixed heap memory corruption on gdk-pixbuf (bsc#1219276)
* Changes in version 2.42.12:
* ani: Reject files with multiple INA or IART chunks,
* ani: validate chunk size,
* Updated translations.
* Enable other image loaders such as xpm and xbm (bsc#1223903)
* Changes in version 2.42.11:
* Disable fringe loaders by default.
* Introspection fixes.
* Updated translations.
* Changes in version 2.42.10:
* Search for rst2man.py.
* Update the memory size limit for JPEG images.
* Updated translations.
* Fixed loading of larger images
* Avoid Bash specific syntax in baselibs postscript (bsc#1195391)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2077=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2077=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2077=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2077=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2077=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2077=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2077=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2077=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2077=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2077=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2077=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2077=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2077=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2077=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Proxy 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* gdk-pixbuf-query-loaders-64bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-64bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1195391
* https://bugzilla.suse.com/show_bug.cgi?id=1219276
* https://bugzilla.suse.com/show_bug.cgi?id=1223903
1
0
SUSE-SU-2024:2083-1: important: Security update for libarchive
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
19 Jun '24
# Security update for libarchive
Announcement ID: SUSE-SU-2024:2083-1
Rating: important
References:
* bsc#1225971
* bsc#1225972
Cross-References:
* CVE-2024-20696
* CVE-2024-20697
CVSS scores:
* CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for libarchive fixes the following issues:
* CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability
(bsc#1225972).
* CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2083=1 openSUSE-SLE-15.6-2024-2083=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2083=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2083=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* bsdtar-debuginfo-3.7.2-150600.3.3.1
* libarchive13-debuginfo-3.7.2-150600.3.3.1
* libarchive-devel-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* libarchive13-3.7.2-150600.3.3.1
* bsdtar-3.7.2-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libarchive13-32bit-3.7.2-150600.3.3.1
* libarchive13-32bit-debuginfo-3.7.2-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libarchive13-64bit-3.7.2-150600.3.3.1
* libarchive13-64bit-debuginfo-3.7.2-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libarchive-devel-3.7.2-150600.3.3.1
* libarchive13-debuginfo-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* libarchive13-3.7.2-150600.3.3.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* bsdtar-debuginfo-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* bsdtar-3.7.2-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-20696.html
* https://www.suse.com/security/cve/CVE-2024-20697.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225971
* https://bugzilla.suse.com/show_bug.cgi?id=1225972
1
0
SUSE-SU-2024:2076-1: important: Security update for gdk-pixbuf
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
by OPENSUSE-SECURITY-UPDATES 19 Jun '24
19 Jun '24
# Security update for gdk-pixbuf
Announcement ID: SUSE-SU-2024:2076-1
Rating: important
References:
* bsc#1195391
* bsc#1219276
* bsc#1223903
Cross-References:
* CVE-2022-48622
CVSS scores:
* CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for gdk-pixbuf fixes the following issues:
gdk-pixbuf was updated to version 2.42.12:
* Security issues fixed:
* CVE-2022-48622: Fixed vulnerability where a crafted .ani file could allow an
attacker to overwrite heap metadata, leading to a denial of service or code
execution attack to a denial of service or code execution attack
(bsc#1219276)
* Changes in version 2.42.12:
* ani: Reject files with multiple INA or IART chunks,
* ani: validate chunk size,
* Updated translations.
* Enable other image loaders such as xpm and xbm (bsc#1223903)
* Changes in version 2.42.11:
* Disable fringe loaders by default.
* Introspection fixes.
* Updated translations.
* Changes in version 2.42.10:
* Search for rst2man.py.
* Update the memory size limit for JPEG images.
* Updated translations.
* Fixed loading of larger images
* Avoid Bash specific syntax in baselibs postscript (bsc#1195391)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2076=1 openSUSE-SLE-15.6-2024-2076=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2076=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-devel-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* gdk-pixbuf-devel-64bit-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-64bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1195391
* https://bugzilla.suse.com/show_bug.cgi?id=1219276
* https://bugzilla.suse.com/show_bug.cgi?id=1223903
1
0
openSUSE-SU-2024:0167-1: important: Security update for gdcm
by opensuse-securityďĽ opensuse.org 19 Jun '24
by opensuse-securityďĽ opensuse.org 19 Jun '24
19 Jun '24
openSUSE Security Update: Security update for gdcm
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0167-1
Rating: important
References: #1223398
Cross-References: CVE-2024-22373
CVSS scores:
CVE-2024-22373 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for gdcm fixes the following issues:
- CVE-2024-22373: Fixed out-of-bounds write vulnerability in
JPEG2000Codec::DecodeByStreamsCommon (boo#1223398).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-167=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le s390x x86_64):
gdcm-3.0.24-bp155.2.4.1
gdcm-applications-3.0.24-bp155.2.4.1
gdcm-devel-3.0.24-bp155.2.4.1
gdcm-examples-3.0.24-bp155.2.4.1
libgdcm3_0-3.0.24-bp155.2.4.1
libsocketxx1_2-3.0.24-bp155.2.4.1
python3-gdcm-3.0.24-bp155.2.4.1
References:
https://www.suse.com/security/cve/CVE-2024-22373.html
https://bugzilla.suse.com/1223398
1
0
SUSE-SU-2024:1539-2: moderate: Security update for bouncycastle
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for bouncycastle
Announcement ID: SUSE-SU-2024:1539-2
Rating: moderate
References:
* bsc#1223252
Cross-References:
* CVE-2024-30171
CVSS scores:
* CVE-2024-30171 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for bouncycastle fixes the following issues:
Update to version 1.78.1, including fixes for:
* CVE-2024-30171: Fixed timing side-channel attacks against RSA decryption
(both PKCS#1v1.5 and OAEP). (bsc#1223252)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1539=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1539=1
## Package List:
* Development Tools Module 15-SP6 (noarch)
* bouncycastle-pg-1.78.1-150200.3.29.1
* bouncycastle-util-1.78.1-150200.3.29.1
* bouncycastle-pkix-1.78.1-150200.3.29.1
* bouncycastle-1.78.1-150200.3.29.1
* openSUSE Leap 15.6 (noarch)
* bouncycastle-javadoc-1.78.1-150200.3.29.1
* bouncycastle-jmail-1.78.1-150200.3.29.1
* bouncycastle-tls-1.78.1-150200.3.29.1
* bouncycastle-pg-1.78.1-150200.3.29.1
* bouncycastle-1.78.1-150200.3.29.1
* bouncycastle-mail-1.78.1-150200.3.29.1
* bouncycastle-util-1.78.1-150200.3.29.1
* bouncycastle-pkix-1.78.1-150200.3.29.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30171.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223252
1
0
SUSE-SU-2024:1590-2: moderate: Security update for ghostscript
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for ghostscript
Announcement ID: SUSE-SU-2024:1590-2
Rating: moderate
References:
* bsc#1223852
Cross-References:
* CVE-2023-52722
CVSS scores:
* CVE-2023-52722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for ghostscript fixes the following issues:
* CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard
while using SAFER mode (bsc#1223852).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1590=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1590=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ghostscript-debuginfo-9.52-150000.188.1
* ghostscript-x11-debuginfo-9.52-150000.188.1
* ghostscript-devel-9.52-150000.188.1
* ghostscript-9.52-150000.188.1
* ghostscript-debugsource-9.52-150000.188.1
* ghostscript-x11-9.52-150000.188.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ghostscript-debuginfo-9.52-150000.188.1
* ghostscript-x11-debuginfo-9.52-150000.188.1
* ghostscript-devel-9.52-150000.188.1
* ghostscript-9.52-150000.188.1
* ghostscript-debugsource-9.52-150000.188.1
* ghostscript-x11-9.52-150000.188.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52722.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223852
1
0
18 Jun '24
# Security update for libaom
Announcement ID: SUSE-SU-2024:2056-1
Rating: important
References:
* bsc#1226020
Cross-References:
* CVE-2024-5171
CVSS scores:
* CVE-2024-5171 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for libaom fixes the following issues:
* CVE-2024-5171: Fixed heap buffer overflow in img_alloc_helper() caused by
integer overflow (bsc#1226020).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2056=1 openSUSE-SLE-15.6-2024-2056=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2056=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libaom3-debuginfo-3.7.1-150600.3.3.1
* libaom3-3.7.1-150600.3.3.1
* aom-tools-debuginfo-3.7.1-150600.3.3.1
* libaom-debugsource-3.7.1-150600.3.3.1
* libaom-devel-3.7.1-150600.3.3.1
* aom-tools-3.7.1-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libaom3-32bit-debuginfo-3.7.1-150600.3.3.1
* libaom3-32bit-3.7.1-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* libaom-devel-doc-3.7.1-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libaom3-64bit-3.7.1-150600.3.3.1
* libaom3-64bit-debuginfo-3.7.1-150600.3.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libaom3-debuginfo-3.7.1-150600.3.3.1
* libaom-debugsource-3.7.1-150600.3.3.1
* libaom3-3.7.1-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5171.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226020
1
0
SUSE-SU-2024:2059-1: important: Security update for openssl-1_1
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2024:2059-1
Rating: important
References:
* bsc#1225551
Cross-References:
* CVE-2024-4741
CVSS scores:
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2059=1 openSUSE-SLE-15.6-2024-2059=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2059=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2059=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2059=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl1_1-1.1.1w-150600.5.3.1
* libopenssl-1_1-devel-1.1.1w-150600.5.3.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.3.1
* openssl-1_1-1.1.1w-150600.5.3.1
* openssl-1_1-debugsource-1.1.1w-150600.5.3.1
* libopenssl1_1-debuginfo-1.1.1w-150600.5.3.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl1_1-32bit-1.1.1w-150600.5.3.1
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.3.1
* libopenssl-1_1-devel-32bit-1.1.1w-150600.5.3.1
* openSUSE Leap 15.6 (noarch)
* openssl-1_1-doc-1.1.1w-150600.5.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl1_1-64bit-1.1.1w-150600.5.3.1
* libopenssl1_1-64bit-debuginfo-1.1.1w-150600.5.3.1
* libopenssl-1_1-devel-64bit-1.1.1w-150600.5.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libopenssl1_1-1.1.1w-150600.5.3.1
* openssl-1_1-debugsource-1.1.1w-150600.5.3.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.3.1
* libopenssl1_1-debuginfo-1.1.1w-150600.5.3.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl1_1-32bit-1.1.1w-150600.5.3.1
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.3.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.3.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.3.1
* libopenssl-1_1-devel-1.1.1w-150600.5.3.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.3.1
* openssl-1_1-1.1.1w-150600.5.3.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
1
0
18 Jun '24
# Security update for less
Announcement ID: SUSE-SU-2024:2060-1
Rating: important
References:
* bsc#1222849
Cross-References:
* CVE-2024-32487
CVSS scores:
* CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for less fixes the following issues:
* CVE-2024-32487: Fixed OS command injection via a newline character in the
file name. (bsc#1222849)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2060=1 openSUSE-SLE-15.6-2024-2060=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2060=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* less-643-150600.3.3.1
* less-debugsource-643-150600.3.3.1
* less-debuginfo-643-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* less-643-150600.3.3.1
* less-debugsource-643-150600.3.3.1
* less-debuginfo-643-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-32487.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222849
1
0
SUSE-SU-2024:2061-1: important: Security update for MozillaFirefox
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:2061-1
Rating: important
References:
* bsc#1226027
Cross-References:
* CVE-2024-5688
* CVE-2024-5690
* CVE-2024-5691
* CVE-2024-5692
* CVE-2024-5693
* CVE-2024-5696
* CVE-2024-5700
* CVE-2024-5702
CVSS scores:
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
* Update to version 115.12.0 ESR (bsc#1226027)
* CVE-2024-5702: Use-after-free in networking
* CVE-2024-5688: Use-after-free in JavaScript object transplant
* CVE-2024-5690: External protocol handlers leaked by timing attack
* CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to
open a new window
* CVE-2024-5692: Bypass of file name restrictions during saving
* CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas
* CVE-2024-5696: Memory Corruption in Text Fragments
* CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12,
and Thunderbird 115.12
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2061=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2061=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2061=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2061=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2061=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2061=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2061=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2061=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2061=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2061=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2061=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2061=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2061=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2061=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2061=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2061=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-branding-upstream-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-branding-upstream-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-debuginfo-115.12.0-150200.152.140.2
* MozillaFirefox-translations-other-115.12.0-150200.152.140.2
* MozillaFirefox-115.12.0-150200.152.140.2
* MozillaFirefox-translations-common-115.12.0-150200.152.140.2
* MozillaFirefox-debugsource-115.12.0-150200.152.140.2
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-115.12.0-150200.152.140.2
## References:
* https://www.suse.com/security/cve/CVE-2024-5688.html
* https://www.suse.com/security/cve/CVE-2024-5690.html
* https://www.suse.com/security/cve/CVE-2024-5691.html
* https://www.suse.com/security/cve/CVE-2024-5692.html
* https://www.suse.com/security/cve/CVE-2024-5693.html
* https://www.suse.com/security/cve/CVE-2024-5696.html
* https://www.suse.com/security/cve/CVE-2024-5700.html
* https://www.suse.com/security/cve/CVE-2024-5702.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226027
1
0
18 Jun '24
# Security update for booth
Announcement ID: SUSE-SU-2024:2062-1
Rating: important
References:
* bsc#1226032
Cross-References:
* CVE-2024-3049
CVSS scores:
* CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves one vulnerability can now be installed.
## Description:
This update for booth fixes the following issues:
* CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead
to invalid HMAC being accepted by Booth server. (bsc#1226032)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2062=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2062=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* booth-debugsource-1.0-150300.18.6.1
* booth-debuginfo-1.0-150300.18.6.1
* booth-1.0-150300.18.6.1
* booth-test-1.0-150300.18.6.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* booth-debugsource-1.0-150300.18.6.1
* booth-debuginfo-1.0-150300.18.6.1
* booth-1.0-150300.18.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226032
1
0
18 Jun '24
# Security update for booth
Announcement ID: SUSE-SU-2024:2063-1
Rating: important
References:
* bsc#1226032
Cross-References:
* CVE-2024-3049
CVSS scores:
* CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for booth fixes the following issues:
* CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead
to invalid HMAC being accepted by Booth server. (bsc#1226032)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2063=1 openSUSE-SLE-15.5-2024-2063=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2063=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* booth-debuginfo-1.0+20220815.f40c2d5-150500.3.3.1
* booth-debugsource-1.0+20220815.f40c2d5-150500.3.3.1
* booth-1.0+20220815.f40c2d5-150500.3.3.1
* booth-test-1.0+20220815.f40c2d5-150500.3.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* booth-debuginfo-1.0+20220815.f40c2d5-150500.3.3.1
* booth-debugsource-1.0+20220815.f40c2d5-150500.3.3.1
* booth-1.0+20220815.f40c2d5-150500.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226032
1
0
SUSE-SU-2024:2064-1: important: Security update for python-Authlib
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for python-Authlib
Announcement ID: SUSE-SU-2024:2064-1
Rating: important
References:
* bsc#1226138
Cross-References:
* CVE-2024-37568
CVSS scores:
* CVE-2024-37568 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-37568 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Authlib fixes the following issues:
* Update to version 1.3.1
* CVE-2024-37568: Fixed algorithm confusion with asymmetric public keys.
(bsc#1226138)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2064=1 openSUSE-SLE-15.6-2024-2064=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2064=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Authlib-1.3.1-150600.3.3.1
* Python 3 Module 15-SP6 (noarch)
* python311-Authlib-1.3.1-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-37568.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226138
1
0
SUSE-SU-2024:2065-1: important: Security update for webkit2gtk3
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:2065-1
Rating: important
References:
* bsc#1222905
* bsc#1225071
Cross-References:
* CVE-2024-23226
* CVE-2024-27834
CVSS scores:
* CVE-2024-23226 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-27834 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
* Update to version 2.44.2
* CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read
and write capability may be able to bypass Pointer Authentication.
(bsc#1225071)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2065=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2065=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2065=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2065=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2065=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2065=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2065=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2065=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2065=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2065=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2065=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2065=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2065=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkit-jsc-4.1-debuginfo-2.44.2-150400.4.83.2
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* webkit2gtk3-minibrowser-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150400.4.83.2
* webkit-jsc-6.0-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-minibrowser-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit-6_0-2.44.2-150400.4.83.2
* webkit-jsc-4-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk4-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-minibrowser-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk4-minibrowser-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-6_0-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-4.1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-minibrowser-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-4-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-6.0-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* openSUSE Leap 15.4 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-32bit-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-32bit-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-32bit-2.44.2-150400.4.83.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libwebkit2gtk-4_0-37-64bit-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-64bit-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-64bit-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-64bit-2.44.2-150400.4.83.2
* openSUSE Leap 15.5 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* webkit-jsc-4.1-debuginfo-2.44.2-150400.4.83.2
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* webkit2gtk3-minibrowser-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150400.4.83.2
* webkit-jsc-6.0-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-minibrowser-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit-6_0-2.44.2-150400.4.83.2
* webkit-jsc-4-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk4-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-minibrowser-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk4-minibrowser-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-6_0-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-4.1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-minibrowser-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-4-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit-jsc-6.0-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* openSUSE Leap 15.5 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-32bit-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-32bit-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-32bit-2.44.2-150400.4.83.2
* Basesystem Module 15-SP5 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* Desktop Applications Module 15-SP5 (noarch)
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* Development Tools Module 15-SP5 (noarch)
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* WebKitGTK-4.1-lang-2.44.2-150400.4.83.2
* WebKitGTK-6.0-lang-2.44.2-150400.4.83.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* libwebkitgtk-6_0-4-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* webkit2gtk3-debugsource-2.44.2-150400.4.83.2
* webkit2gtk4-debugsource-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.2-150400.4.83.2
* libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-devel-2.44.2-150400.4.83.2
* SUSE Manager Proxy 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* SUSE Manager Proxy 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
* SUSE Manager Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.2-150400.4.83.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2
* typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-debugsource-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2
* webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.2-150400.4.83.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.2-150400.4.83.2
## References:
* https://www.suse.com/security/cve/CVE-2024-23226.html
* https://www.suse.com/security/cve/CVE-2024-27834.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222905
* https://bugzilla.suse.com/show_bug.cgi?id=1225071
1
0
SUSE-SU-2024:2066-1: important: Security update for openssl-3
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:2066-1
Rating: important
References:
* bsc#1223428
* bsc#1224388
* bsc#1225291
* bsc#1225551
Cross-References:
* CVE-2024-4603
* CVE-2024-4741
CVSS scores:
* CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities and has two security fixes can now be
installed.
## Description:
This update for openssl-3 fixes the following issues:
Security issues fixed:
* CVE-2024-4603: Check DSA parameters for excessive sizes before validating
(bsc#1224388)
* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
Other issues fixed:
* Enable livepatching support (bsc#1223428)
* Fix HDKF key derivation (bsc#1225291, gh#openssl/openssl#23448, +
gh#openssl/openssl#23456)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2066=1 openSUSE-SLE-15.6-2024-2066=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2066=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-debugsource-3.1.4-150600.5.7.1
* openssl-3-debuginfo-3.1.4-150600.5.7.1
* openssl-3-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.7.1
* libopenssl3-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-3.1.4-150600.5.7.1
* libopenssl-3-devel-3.1.4-150600.5.7.1
* libopenssl3-debuginfo-3.1.4-150600.5.7.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl-3-devel-32bit-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl3-32bit-3.1.4-150600.5.7.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.7.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl-3-devel-64bit-3.1.4-150600.5.7.1
* libopenssl3-64bit-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.7.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-3-debugsource-3.1.4-150600.5.7.1
* openssl-3-debuginfo-3.1.4-150600.5.7.1
* openssl-3-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.7.1
* libopenssl3-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-3.1.4-150600.5.7.1
* libopenssl-3-devel-3.1.4-150600.5.7.1
* libopenssl3-debuginfo-3.1.4-150600.5.7.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.7.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.7.1
* libopenssl3-32bit-3.1.4-150600.5.7.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4603.html
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223428
* https://bugzilla.suse.com/show_bug.cgi?id=1224388
* https://bugzilla.suse.com/show_bug.cgi?id=1225291
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
1
0
SUSE-SU-2024:2067-1: important: Security update for xdg-desktop-portal
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for xdg-desktop-portal
Announcement ID: SUSE-SU-2024:2067-1
Rating: important
References:
* bsc#1223110
Cross-References:
* CVE-2024-32462
CVSS scores:
* CVE-2024-32462 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for xdg-desktop-portal fixes the following issues:
* CVE-2024-32462: Fix arbitrary code execution outside bwrap sandbox by
checking that the first commandline item doesn't start with whitespaces or a
hyphen. (bsc#1223110)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2067=1 openSUSE-SLE-15.6-2024-2067=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2067=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* xdg-desktop-portal-1.18.2-150600.4.3.1
* xdg-desktop-portal-devel-1.18.2-150600.4.3.1
* xdg-desktop-portal-debugsource-1.18.2-150600.4.3.1
* xdg-desktop-portal-debuginfo-1.18.2-150600.4.3.1
* openSUSE Leap 15.6 (noarch)
* xdg-desktop-portal-lang-1.18.2-150600.4.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* xdg-desktop-portal-1.18.2-150600.4.3.1
* xdg-desktop-portal-devel-1.18.2-150600.4.3.1
* xdg-desktop-portal-debugsource-1.18.2-150600.4.3.1
* xdg-desktop-portal-debuginfo-1.18.2-150600.4.3.1
* Desktop Applications Module 15-SP6 (noarch)
* xdg-desktop-portal-lang-1.18.2-150600.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-32462.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223110
1
0
18 Jun '24
# Security update for podman
Announcement ID: SUSE-SU-2024:2050-1
Rating: important
References:
* bsc#1224122
* bsc#1226136
Cross-References:
* CVE-2024-24786
* CVE-2024-3727
CVSS scores:
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for podman fixes the following issues:
* Update to version 4.9.5
* CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected
authenticated registry accesses on behalf of a victim user, causing resource
exhaustion, local path traversal, and other attacks. (bsc#1224122)
* CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2050=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2050=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2050=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2050=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2050=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2050=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2050=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2050=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* podman-4.9.5-150300.9.31.1
* podmansh-4.9.5-150300.9.31.1
* podman-debuginfo-4.9.5-150300.9.31.1
* podman-remote-debuginfo-4.9.5-150300.9.31.1
* podman-remote-4.9.5-150300.9.31.1
* openSUSE Leap 15.3 (noarch)
* podman-docker-4.9.5-150300.9.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* podman-4.9.5-150300.9.31.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* podman-4.9.5-150300.9.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* podman-4.9.5-150300.9.31.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* podman-4.9.5-150300.9.31.1
* podman-debuginfo-4.9.5-150300.9.31.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* podman-4.9.5-150300.9.31.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* podman-4.9.5-150300.9.31.1
* podman-debuginfo-4.9.5-150300.9.31.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* podman-4.9.5-150300.9.31.1
* podman-debuginfo-4.9.5-150300.9.31.1
## References:
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224122
* https://bugzilla.suse.com/show_bug.cgi?id=1226136
1
0
SUSE-SU-2024:2051-1: important: Security update for openssl-1_1
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
by OPENSUSE-SECURITY-UPDATES 18 Jun '24
18 Jun '24
# Security update for openssl-1_1
Announcement ID: SUSE-SU-2024:2051-1
Rating: important
References:
* bsc#1225551
Cross-References:
* CVE-2024-4741
CVSS scores:
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-1_1 fixes the following issues:
* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2051=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2051=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2051=1 openSUSE-SLE-15.5-2024-2051=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.31.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1
* openssl-1_1-debugsource-1.1.1l-150500.17.31.1
* libopenssl1_1-1.1.1l-150500.17.31.1
* libopenssl1_1-hmac-1.1.1l-150500.17.31.1
* openssl-1_1-1.1.1l-150500.17.31.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.31.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libopenssl-1_1-devel-1.1.1l-150500.17.31.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1
* openssl-1_1-debugsource-1.1.1l-150500.17.31.1
* libopenssl1_1-1.1.1l-150500.17.31.1
* libopenssl1_1-hmac-1.1.1l-150500.17.31.1
* openssl-1_1-1.1.1l-150500.17.31.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.31.1
* Basesystem Module 15-SP5 (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.31.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.31.1
* libopenssl1_1-32bit-1.1.1l-150500.17.31.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-1_1-devel-1.1.1l-150500.17.31.1
* libopenssl1_1-debuginfo-1.1.1l-150500.17.31.1
* openssl-1_1-debugsource-1.1.1l-150500.17.31.1
* libopenssl1_1-1.1.1l-150500.17.31.1
* libopenssl1_1-hmac-1.1.1l-150500.17.31.1
* openssl-1_1-1.1.1l-150500.17.31.1
* openssl-1_1-debuginfo-1.1.1l-150500.17.31.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl1_1-hmac-32bit-1.1.1l-150500.17.31.1
* libopenssl-1_1-devel-32bit-1.1.1l-150500.17.31.1
* libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.31.1
* libopenssl1_1-32bit-1.1.1l-150500.17.31.1
* openSUSE Leap 15.5 (noarch)
* openssl-1_1-doc-1.1.1l-150500.17.31.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl1_1-hmac-64bit-1.1.1l-150500.17.31.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150500.17.31.1
* libopenssl-1_1-devel-64bit-1.1.1l-150500.17.31.1
* libopenssl1_1-64bit-1.1.1l-150500.17.31.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
1
0
17 Jun '24
# Security update for php8
Announcement ID: SUSE-SU-2024:2039-1
Rating: important
References:
* bsc#1226073
Cross-References:
* CVE-2024-5458
CVSS scores:
* CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for php8 fixes the following issues:
* CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var
FILTER_VALIDATE_URL. (bsc#1226073)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2039=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2039=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2039=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2039=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2039=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2039=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2039=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2039=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* php8-sysvmsg-8.0.30-150400.4.43.1
* php8-xmlwriter-8.0.30-150400.4.43.1
* php8-openssl-8.0.30-150400.4.43.1
* php8-gd-8.0.30-150400.4.43.1
* php8-xsl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debuginfo-8.0.30-150400.4.43.1
* php8-zlib-8.0.30-150400.4.43.1
* php8-ldap-8.0.30-150400.4.43.1
* php8-debugsource-8.0.30-150400.4.43.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-8.0.30-150400.4.43.1
* php8-gettext-debuginfo-8.0.30-150400.4.43.1
* php8-tidy-8.0.30-150400.4.43.1
* php8-dom-8.0.30-150400.4.43.1
* php8-xmlreader-8.0.30-150400.4.43.1
* php8-curl-debuginfo-8.0.30-150400.4.43.1
* php8-pdo-8.0.30-150400.4.43.1
* php8-openssl-debuginfo-8.0.30-150400.4.43.1
* php8-sockets-8.0.30-150400.4.43.1
* php8-curl-8.0.30-150400.4.43.1
* php8-posix-8.0.30-150400.4.43.1
* php8-debuginfo-8.0.30-150400.4.43.1
* php8-fileinfo-8.0.30-150400.4.43.1
* php8-cli-debuginfo-8.0.30-150400.4.43.1
* php8-ctype-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-8.0.30-150400.4.43.1
* php8-opcache-8.0.30-150400.4.43.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.43.1
* php8-dba-debuginfo-8.0.30-150400.4.43.1
* php8-pcntl-debuginfo-8.0.30-150400.4.43.1
* php8-8.0.30-150400.4.43.1
* php8-calendar-8.0.30-150400.4.43.1
* php8-tokenizer-8.0.30-150400.4.43.1
* php8-sysvshm-8.0.30-150400.4.43.1
* php8-pcntl-8.0.30-150400.4.43.1
* php8-zlib-debuginfo-8.0.30-150400.4.43.1
* php8-zip-8.0.30-150400.4.43.1
* php8-ftp-debuginfo-8.0.30-150400.4.43.1
* php8-iconv-debuginfo-8.0.30-150400.4.43.1
* php8-soap-8.0.30-150400.4.43.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.43.1
* php8-embed-8.0.30-150400.4.43.1
* php8-exif-8.0.30-150400.4.43.1
* php8-sodium-8.0.30-150400.4.43.1
* php8-intl-debuginfo-8.0.30-150400.4.43.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.43.1
* php8-pgsql-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-debuginfo-8.0.30-150400.4.43.1
* php8-soap-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-debuginfo-8.0.30-150400.4.43.1
* php8-mysql-8.0.30-150400.4.43.1
* php8-readline-debuginfo-8.0.30-150400.4.43.1
* php8-devel-8.0.30-150400.4.43.1
* php8-ldap-debuginfo-8.0.30-150400.4.43.1
* php8-zip-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-8.0.30-150400.4.43.1
* php8-gd-debuginfo-8.0.30-150400.4.43.1
* php8-dba-8.0.30-150400.4.43.1
* php8-enchant-8.0.30-150400.4.43.1
* php8-fpm-debuginfo-8.0.30-150400.4.43.1
* php8-sqlite-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.43.1
* php8-bz2-debuginfo-8.0.30-150400.4.43.1
* php8-test-8.0.30-150400.4.43.1
* php8-iconv-8.0.30-150400.4.43.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.43.1
* php8-shmop-debuginfo-8.0.30-150400.4.43.1
* php8-enchant-debuginfo-8.0.30-150400.4.43.1
* php8-mbstring-debuginfo-8.0.30-150400.4.43.1
* php8-snmp-8.0.30-150400.4.43.1
* php8-tidy-debuginfo-8.0.30-150400.4.43.1
* php8-odbc-debuginfo-8.0.30-150400.4.43.1
* php8-phar-8.0.30-150400.4.43.1
* php8-snmp-debuginfo-8.0.30-150400.4.43.1
* php8-bcmath-8.0.30-150400.4.43.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.43.1
* php8-gmp-8.0.30-150400.4.43.1
* php8-sqlite-8.0.30-150400.4.43.1
* php8-fpm-8.0.30-150400.4.43.1
* php8-readline-8.0.30-150400.4.43.1
* php8-cli-8.0.30-150400.4.43.1
* php8-dom-debuginfo-8.0.30-150400.4.43.1
* php8-sysvsem-8.0.30-150400.4.43.1
* php8-posix-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-8.0.30-150400.4.43.1
* php8-exif-debuginfo-8.0.30-150400.4.43.1
* php8-calendar-debuginfo-8.0.30-150400.4.43.1
* php8-fpm-debugsource-8.0.30-150400.4.43.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.43.1
* php8-fastcgi-debugsource-8.0.30-150400.4.43.1
* php8-shmop-8.0.30-150400.4.43.1
* php8-sockets-debuginfo-8.0.30-150400.4.43.1
* php8-xsl-8.0.30-150400.4.43.1
* php8-bcmath-debuginfo-8.0.30-150400.4.43.1
* php8-intl-8.0.30-150400.4.43.1
* php8-odbc-8.0.30-150400.4.43.1
* php8-bz2-8.0.30-150400.4.43.1
* php8-opcache-debuginfo-8.0.30-150400.4.43.1
* php8-gettext-8.0.30-150400.4.43.1
* php8-pgsql-8.0.30-150400.4.43.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.43.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.43.1
* php8-sodium-debuginfo-8.0.30-150400.4.43.1
* php8-phar-debuginfo-8.0.30-150400.4.43.1
* php8-embed-debugsource-8.0.30-150400.4.43.1
* php8-ftp-8.0.30-150400.4.43.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5458.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226073
1
0
17 Jun '24
# Security update for booth
Announcement ID: SUSE-SU-2024:2040-1
Rating: important
References:
* bsc#1226032
Cross-References:
* CVE-2024-3049
CVSS scores:
* CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for booth fixes the following issues:
* CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead
to invalid HMAC being accepted by Booth server. (bsc#1226032)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2040=1 openSUSE-SLE-15.6-2024-2040=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2040=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* booth-debugsource-1.1+git0.09b0074-150600.3.3.1
* booth-debuginfo-1.1+git0.09b0074-150600.3.3.1
* booth-1.1+git0.09b0074-150600.3.3.1
* booth-test-1.1+git0.09b0074-150600.3.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* booth-debugsource-1.1+git0.09b0074-150600.3.3.1
* booth-debuginfo-1.1+git0.09b0074-150600.3.3.1
* booth-1.1+git0.09b0074-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226032
1
0
17 Jun '24
# Security update for booth
Announcement ID: SUSE-SU-2024:2042-1
Rating: important
References:
* bsc#1226032
Cross-References:
* CVE-2024-3049
CVSS scores:
* CVE-2024-3049 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-3049 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for booth fixes the following issues:
* CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead
to invalid HMAC being accepted by Booth server. (bsc#1226032)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2042=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2042=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* booth-1.0+20210519.bfb2f92-150400.3.6.1
* booth-debuginfo-1.0+20210519.bfb2f92-150400.3.6.1
* booth-debugsource-1.0+20210519.bfb2f92-150400.3.6.1
* booth-test-1.0+20210519.bfb2f92-150400.3.6.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* booth-1.0+20210519.bfb2f92-150400.3.6.1
* booth-debuginfo-1.0+20210519.bfb2f92-150400.3.6.1
* booth-debugsource-1.0+20210519.bfb2f92-150400.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3049.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226032
1
0
17 Jun '24
# Security update for php8
Announcement ID: SUSE-SU-2024:2038-1
Rating: important
References:
* bsc#1226073
Cross-References:
* CVE-2024-5458
CVSS scores:
* CVE-2024-5458 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-5458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for php8 fixes the following issues:
* CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var
FILTER_VALIDATE_URL. (bsc#1226073)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2038=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2038=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2038=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2038=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2038=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2038=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2038=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2038=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2038=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2038=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2038=1
## Package List:
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* php7-embed-debugsource-7.4.33-150400.4.37.1
* php7-embed-7.4.33-150400.4.37.1
* php7-embed-debuginfo-7.4.33-150400.4.37.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* php7-embed-debugsource-7.4.33-150400.4.37.1
* php7-embed-7.4.33-150400.4.37.1
* php7-embed-debuginfo-7.4.33-150400.4.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-test-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debugsource-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-embed-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-test-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debugsource-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-embed-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* php7-intl-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debuginfo-7.4.33-150400.4.37.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debugsource-7.4.33-150400.4.37.1
* php7-pdo-7.4.33-150400.4.37.1
* php7-zlib-7.4.33-150400.4.37.1
* php7-json-7.4.33-150400.4.37.1
* php7-tokenizer-7.4.33-150400.4.37.1
* php7-mbstring-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-debuginfo-7.4.33-150400.4.37.1
* php7-gmp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-7.4.33-150400.4.37.1
* php7-sodium-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.37.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.37.1
* php7-curl-7.4.33-150400.4.37.1
* php7-mysql-debuginfo-7.4.33-150400.4.37.1
* php7-7.4.33-150400.4.37.1
* php7-gettext-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-7.4.33-150400.4.37.1
* php7-zip-debuginfo-7.4.33-150400.4.37.1
* php7-debugsource-7.4.33-150400.4.37.1
* php7-fpm-debuginfo-7.4.33-150400.4.37.1
* php7-xsl-7.4.33-150400.4.37.1
* php7-iconv-7.4.33-150400.4.37.1
* php7-openssl-7.4.33-150400.4.37.1
* php7-sqlite-7.4.33-150400.4.37.1
* php7-gd-7.4.33-150400.4.37.1
* php7-exif-debuginfo-7.4.33-150400.4.37.1
* php7-json-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-7.4.33-150400.4.37.1
* php7-readline-debuginfo-7.4.33-150400.4.37.1
* php7-cli-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-7.4.33-150400.4.37.1
* php7-sockets-7.4.33-150400.4.37.1
* php7-test-7.4.33-150400.4.37.1
* php7-shmop-debuginfo-7.4.33-150400.4.37.1
* php7-zip-7.4.33-150400.4.37.1
* php7-dba-7.4.33-150400.4.37.1
* php7-pcntl-debuginfo-7.4.33-150400.4.37.1
* php7-tidy-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-7.4.33-150400.4.37.1
* apache2-mod_php7-7.4.33-150400.4.37.1
* php7-shmop-7.4.33-150400.4.37.1
* php7-sockets-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-debuginfo-7.4.33-150400.4.37.1
* php7-cli-7.4.33-150400.4.37.1
* php7-soap-7.4.33-150400.4.37.1
* php7-sodium-7.4.33-150400.4.37.1
* php7-fpm-debugsource-7.4.33-150400.4.37.1
* php7-ldap-debuginfo-7.4.33-150400.4.37.1
* php7-mysql-7.4.33-150400.4.37.1
* php7-xmlreader-7.4.33-150400.4.37.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-7.4.33-150400.4.37.1
* php7-sysvmsg-7.4.33-150400.4.37.1
* php7-fileinfo-7.4.33-150400.4.37.1
* php7-pcntl-7.4.33-150400.4.37.1
* php7-bz2-7.4.33-150400.4.37.1
* php7-gd-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-7.4.33-150400.4.37.1
* php7-fastcgi-debugsource-7.4.33-150400.4.37.1
* php7-ldap-7.4.33-150400.4.37.1
* php7-pdo-debuginfo-7.4.33-150400.4.37.1
* php7-bcmath-7.4.33-150400.4.37.1
* php7-mbstring-7.4.33-150400.4.37.1
* php7-pgsql-debuginfo-7.4.33-150400.4.37.1
* php7-bz2-debuginfo-7.4.33-150400.4.37.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.37.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.37.1
* php7-snmp-debuginfo-7.4.33-150400.4.37.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.37.1
* php7-enchant-7.4.33-150400.4.37.1
* php7-phar-7.4.33-150400.4.37.1
* php7-posix-debuginfo-7.4.33-150400.4.37.1
* php7-phar-debuginfo-7.4.33-150400.4.37.1
* php7-embed-debugsource-7.4.33-150400.4.37.1
* php7-curl-debuginfo-7.4.33-150400.4.37.1
* php7-gettext-7.4.33-150400.4.37.1
* php7-ftp-7.4.33-150400.4.37.1
* php7-devel-7.4.33-150400.4.37.1
* php7-sqlite-debuginfo-7.4.33-150400.4.37.1
* php7-dba-debuginfo-7.4.33-150400.4.37.1
* php7-ftp-debuginfo-7.4.33-150400.4.37.1
* php7-calendar-debuginfo-7.4.33-150400.4.37.1
* php7-fpm-7.4.33-150400.4.37.1
* php7-pgsql-7.4.33-150400.4.37.1
* php7-gmp-7.4.33-150400.4.37.1
* php7-opcache-7.4.33-150400.4.37.1
* php7-posix-7.4.33-150400.4.37.1
* php7-intl-7.4.33-150400.4.37.1
* php7-sysvsem-7.4.33-150400.4.37.1
* php7-embed-7.4.33-150400.4.37.1
* php7-tidy-7.4.33-150400.4.37.1
* php7-readline-7.4.33-150400.4.37.1
* php7-soap-debuginfo-7.4.33-150400.4.37.1
* php7-openssl-debuginfo-7.4.33-150400.4.37.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.37.1
* php7-exif-7.4.33-150400.4.37.1
* php7-iconv-debuginfo-7.4.33-150400.4.37.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.37.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.37.1
* php7-dom-debuginfo-7.4.33-150400.4.37.1
* php7-fastcgi-7.4.33-150400.4.37.1
* php7-debuginfo-7.4.33-150400.4.37.1
* php7-odbc-7.4.33-150400.4.37.1
* php7-zlib-debuginfo-7.4.33-150400.4.37.1
* php7-ctype-debuginfo-7.4.33-150400.4.37.1
* php7-opcache-debuginfo-7.4.33-150400.4.37.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5458.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226073
1
0
15 Jun '24
# Security update for mariadb
Announcement ID: SUSE-SU-2024:2032-1
Rating: moderate
References:
* bsc#1225983
Cross-References:
* CVE-2024-21096
CVSS scores:
* CVE-2024-21096 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Affected Products:
* Galera for Ericsson 15 SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for mariadb fixes the following issues:
* CVE-2024-21096: Fixed mysqldump unspecified vulnerability (bsc#1225983).
* Update to 10.11.8.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2032=1 openSUSE-SLE-15.6-2024-2032=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2032=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2032=1
* Galera for Ericsson 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-2032=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mariadb-rpm-macros-10.11.8-150600.4.3.1
* mariadb-tools-10.11.8-150600.4.3.1
* mariadb-tools-debuginfo-10.11.8-150600.4.3.1
* mariadb-bench-debuginfo-10.11.8-150600.4.3.1
* mariadb-test-10.11.8-150600.4.3.1
* mariadb-10.11.8-150600.4.3.1
* mariadb-debuginfo-10.11.8-150600.4.3.1
* mariadb-test-debuginfo-10.11.8-150600.4.3.1
* libmariadbd-devel-10.11.8-150600.4.3.1
* mariadb-client-debuginfo-10.11.8-150600.4.3.1
* mariadb-galera-10.11.8-150600.4.3.1
* mariadb-client-10.11.8-150600.4.3.1
* mariadb-bench-10.11.8-150600.4.3.1
* mariadb-debugsource-10.11.8-150600.4.3.1
* libmariadbd19-10.11.8-150600.4.3.1
* libmariadbd19-debuginfo-10.11.8-150600.4.3.1
* openSUSE Leap 15.6 (noarch)
* mariadb-errormessages-10.11.8-150600.4.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* mariadb-debuginfo-10.11.8-150600.4.3.1
* mariadb-debugsource-10.11.8-150600.4.3.1
* mariadb-galera-10.11.8-150600.4.3.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mariadb-tools-10.11.8-150600.4.3.1
* mariadb-tools-debuginfo-10.11.8-150600.4.3.1
* mariadb-10.11.8-150600.4.3.1
* mariadb-debuginfo-10.11.8-150600.4.3.1
* libmariadbd-devel-10.11.8-150600.4.3.1
* mariadb-client-debuginfo-10.11.8-150600.4.3.1
* mariadb-client-10.11.8-150600.4.3.1
* mariadb-debugsource-10.11.8-150600.4.3.1
* libmariadbd19-10.11.8-150600.4.3.1
* libmariadbd19-debuginfo-10.11.8-150600.4.3.1
* Server Applications Module 15-SP6 (noarch)
* mariadb-errormessages-10.11.8-150600.4.3.1
* Galera for Ericsson 15 SP6 (x86_64)
* mariadb-debuginfo-10.11.8-150600.4.3.1
* mariadb-debugsource-10.11.8-150600.4.3.1
* mariadb-galera-10.11.8-150600.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225983
1
0
14 Jun '24
# Security update for podman
Announcement ID: SUSE-SU-2024:2031-1
Rating: important
References:
* bsc#1224122
* bsc#1226136
Cross-References:
* CVE-2024-24786
* CVE-2024-3727
CVSS scores:
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for podman fixes the following issues:
* Update to version 4.9.5
* CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected
authenticated registry accesses on behalf of a victim user, causing resource
exhaustion, local path traversal, and other attacks. (bsc#1224122)
* CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2031=1 openSUSE-SLE-15.5-2024-2031=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2031=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2031=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-2031=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2031=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podmansh-4.9.5-150500.3.12.1
* podman-4.9.5-150500.3.12.1
* podman-debuginfo-4.9.5-150500.3.12.1
* podman-remote-debuginfo-4.9.5-150500.3.12.1
* podman-remote-4.9.5-150500.3.12.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.9.5-150500.3.12.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* podmansh-4.9.5-150500.3.12.1
* podman-4.9.5-150500.3.12.1
* podman-debuginfo-4.9.5-150500.3.12.1
* podman-remote-debuginfo-4.9.5-150500.3.12.1
* podman-remote-4.9.5-150500.3.12.1
* openSUSE Leap 15.6 (noarch)
* podman-docker-4.9.5-150500.3.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* podmansh-4.9.5-150500.3.12.1
* podman-4.9.5-150500.3.12.1
* podman-debuginfo-4.9.5-150500.3.12.1
* podman-remote-debuginfo-4.9.5-150500.3.12.1
* podman-remote-4.9.5-150500.3.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.9.5-150500.3.12.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* podmansh-4.9.5-150500.3.12.1
* podman-4.9.5-150500.3.12.1
* podman-debuginfo-4.9.5-150500.3.12.1
* podman-remote-debuginfo-4.9.5-150500.3.12.1
* podman-remote-4.9.5-150500.3.12.1
* Containers Module 15-SP5 (noarch)
* podman-docker-4.9.5-150500.3.12.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* podmansh-4.9.5-150500.3.12.1
* podman-4.9.5-150500.3.12.1
* podman-debuginfo-4.9.5-150500.3.12.1
* podman-remote-debuginfo-4.9.5-150500.3.12.1
* podman-remote-4.9.5-150500.3.12.1
* Containers Module 15-SP6 (noarch)
* podman-docker-4.9.5-150500.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224122
* https://bugzilla.suse.com/show_bug.cgi?id=1226136
1
0
SUSE-SU-2024:1571-2: important: Security update for python-pymongo
by OPENSUSE-SECURITY-UPDATES 14 Jun '24
by OPENSUSE-SECURITY-UPDATES 14 Jun '24
14 Jun '24
# Security update for python-pymongo
Announcement ID: SUSE-SU-2024:1571-2
Rating: important
References:
* bsc#1222492
Cross-References:
* CVE-2024-21506
CVSS scores:
* CVE-2024-21506 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-pymongo fixes the following issues:
* CVE-2024-21506: Fixed out-of-bounds read in the BSON module (bsc#1222492)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1571=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1571=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-pymongo-3.11.0-150300.3.3.1
* python-pymongo-debugsource-3.11.0-150300.3.3.1
* python-pymongo-debuginfo-3.11.0-150300.3.3.1
* python3-pymongo-debuginfo-3.11.0-150300.3.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-pymongo-3.11.0-150300.3.3.1
* python-pymongo-debugsource-3.11.0-150300.3.3.1
* python-pymongo-debuginfo-3.11.0-150300.3.3.1
* python3-pymongo-debuginfo-3.11.0-150300.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21506.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222492
1
0
14 Jun '24
# Security update for tiff
Announcement ID: SUSE-SU-2024:2028-1
Rating: moderate
References:
* bsc#1212233
Cross-References:
* CVE-2023-3164
CVSS scores:
* CVE-2023-3164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-3164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for tiff fixes the following issues:
* CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2028=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2028=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2028=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2028=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2028=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2028=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2028=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2028=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2028=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2028=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2028=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2028=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2028=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* tiff-debuginfo-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff-devel-4.0.9-150000.45.44.1
* Basesystem Module 15-SP5 (x86_64)
* libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1
* libtiff5-32bit-4.0.9-150000.45.44.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* Basesystem Module 15-SP6 (x86_64)
* libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1
* libtiff5-32bit-4.0.9-150000.45.44.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* tiff-4.0.9-150000.45.44.1
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* openSUSE Leap 15.5 (x86_64)
* libtiff5-32bit-debuginfo-4.0.9-150000.45.44.1
* libtiff5-32bit-4.0.9-150000.45.44.1
* libtiff-devel-32bit-4.0.9-150000.45.44.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* tiff-4.0.9-150000.45.44.1
* tiff-debuginfo-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff-devel-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.44.1
* tiff-debugsource-4.0.9-150000.45.44.1
* libtiff5-4.0.9-150000.45.44.1
* libtiff5-debuginfo-4.0.9-150000.45.44.1
## References:
* https://www.suse.com/security/cve/CVE-2023-3164.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212233
1
0
SUSE-SU-2024:2029-1: moderate: Security update for python-scikit-learn
by OPENSUSE-SECURITY-UPDATES 14 Jun '24
by OPENSUSE-SECURITY-UPDATES 14 Jun '24
14 Jun '24
# Security update for python-scikit-learn
Announcement ID: SUSE-SU-2024:2029-1
Rating: moderate
References:
* bsc#1226185
Cross-References:
* CVE-2024-5206
CVSS scores:
* CVE-2024-5206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-scikit-learn fixes the following issues:
-CVE-2024-5206: Fixed a possible sensitive data leak in TfidfVectorizer.
(bsc#1226185)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2029=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2029=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2029=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2029=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2029=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1
* python3-scikit-learn-0.23.2-150300.3.3.1
* python-scikit-learn-debugsource-0.23.2-150300.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1
* python3-scikit-learn-0.23.2-150300.3.3.1
* python-scikit-learn-debugsource-0.23.2-150300.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1
* python3-scikit-learn-0.23.2-150300.3.3.1
* python-scikit-learn-debugsource-0.23.2-150300.3.3.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1
* python3-scikit-learn-0.23.2-150300.3.3.1
* python-scikit-learn-debugsource-0.23.2-150300.3.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-scikit-learn-debuginfo-0.23.2-150300.3.3.1
* python3-scikit-learn-0.23.2-150300.3.3.1
* python-scikit-learn-debugsource-0.23.2-150300.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5206.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226185
1
0