openSUSE Updates
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
November 2023
- 2 participants
- 210 discussions
SUSE-SU-2023:4416-1: important: Security update for containerized-data-importer
by maintenance@opensuse.org 13 Nov '23
by maintenance@opensuse.org 13 Nov '23
13 Nov '23
# Security update for containerized-data-importer
Announcement ID: SUSE-SU-2023:4416-1
Rating: important
References:
Affected Products:
* Containers Module 15-SP4
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for containerized-data-importer fixes the following issue:
* rebuild with current go compiler
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2023-4416=1
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-4416=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-4416=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-4416=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-4416=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-4416=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-4416=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-4416=1
## Package List:
* openSUSE Leap Micro 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* openSUSE Leap 15.4 (x86_64)
* containerized-data-importer-api-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-importer-1.51.0-150400.4.20.2
* containerized-data-importer-importer-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-operator-1.51.0-150400.4.20.2
* containerized-data-importer-operator-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-controller-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-cloner-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-uploadproxy-1.51.0-150400.4.20.2
* containerized-data-importer-controller-1.51.0-150400.4.20.2
* containerized-data-importer-uploadserver-1.51.0-150400.4.20.2
* containerized-data-importer-uploadproxy-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-cloner-1.51.0-150400.4.20.2
* containerized-data-importer-uploadserver-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* containerized-data-importer-api-1.51.0-150400.4.20.2
* obs-service-cdi_containers_meta-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* Containers Module 15-SP4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* openSUSE Leap Micro 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
1
0
13 Nov '23
# Security update for apache2
Announcement ID: SUSE-SU-2023:4430-1
Rating: important
References:
* bsc#1207399
* bsc#1214357
* bsc#1216424
Cross-References:
* CVE-2023-31122
CVSS scores:
* CVE-2023-31122 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31122 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP4
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for apache2 fixes the following issues:
* CVE-2023-31122: Fixed an out of bounds read in mod_macro (bsc#1216424).
Non-security fixes:
* Fixed the content type handling in mod_proxy_http2 (bsc#1214357).
* Fixed a floating point exception crash (bsc#1207399).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2023-4430=1 openSUSE-SLE-15.4-2023-4430=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-4430=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-4430=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-4430=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4430=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4430=1
* Server Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4430=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4430=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* apache2-worker-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-event-2.4.51-150400.6.14.1
* apache2-prefork-debuginfo-2.4.51-150400.6.14.1
* apache2-2.4.51-150400.6.14.1
* apache2-example-pages-2.4.51-150400.6.14.1
* apache2-utils-2.4.51-150400.6.14.1
* apache2-prefork-2.4.51-150400.6.14.1
* apache2-utils-debuginfo-2.4.51-150400.6.14.1
* apache2-worker-debuginfo-2.4.51-150400.6.14.1
* apache2-event-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-devel-2.4.51-150400.6.14.1
* openSUSE Leap 15.4 (noarch)
* apache2-doc-2.4.51-150400.6.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* apache2-worker-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-event-2.4.51-150400.6.14.1
* apache2-prefork-debuginfo-2.4.51-150400.6.14.1
* apache2-2.4.51-150400.6.14.1
* apache2-example-pages-2.4.51-150400.6.14.1
* apache2-utils-2.4.51-150400.6.14.1
* apache2-prefork-2.4.51-150400.6.14.1
* apache2-utils-debuginfo-2.4.51-150400.6.14.1
* apache2-worker-debuginfo-2.4.51-150400.6.14.1
* apache2-event-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-devel-2.4.51-150400.6.14.1
* openSUSE Leap 15.5 (noarch)
* apache2-doc-2.4.51-150400.6.14.1
* Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-prefork-debuginfo-2.4.51-150400.6.14.1
* apache2-2.4.51-150400.6.14.1
* apache2-utils-2.4.51-150400.6.14.1
* apache2-prefork-2.4.51-150400.6.14.1
* apache2-utils-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-prefork-debuginfo-2.4.51-150400.6.14.1
* apache2-2.4.51-150400.6.14.1
* apache2-utils-2.4.51-150400.6.14.1
* apache2-prefork-2.4.51-150400.6.14.1
* apache2-utils-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* apache2-event-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-event-debuginfo-2.4.51-150400.6.14.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-event-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-event-debuginfo-2.4.51-150400.6.14.1
* Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* apache2-worker-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-worker-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-devel-2.4.51-150400.6.14.1
* Server Applications Module 15-SP4 (noarch)
* apache2-doc-2.4.51-150400.6.14.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-worker-2.4.51-150400.6.14.1
* apache2-debugsource-2.4.51-150400.6.14.1
* apache2-worker-debuginfo-2.4.51-150400.6.14.1
* apache2-debuginfo-2.4.51-150400.6.14.1
* apache2-devel-2.4.51-150400.6.14.1
* Server Applications Module 15-SP5 (noarch)
* apache2-doc-2.4.51-150400.6.14.1
## References:
* https://www.suse.com/security/cve/CVE-2023-31122.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207399
* https://bugzilla.suse.com/show_bug.cgi?id=1214357
* https://bugzilla.suse.com/show_bug.cgi?id=1216424
1
0
SUSE-SU-2023:4427-1: moderate: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
by maintenance@opensuse.org 13 Nov '23
by maintenance@opensuse.org 13 Nov '23
13 Nov '23
# Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed
Announcement ID: SUSE-SU-2023:4427-1
Rating: moderate
References:
* bsc#1211892
* bsc#1216826
* jsc#PED-4964
Cross-References:
* CVE-2023-31022
CVSS scores:
* CVE-2023-31022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability, contains one feature and has one
security fix can now be installed.
## Description:
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:
Security issue fixed:
* CVE-2023-31022: Fixed NULL ptr deref in kernel module layer
Changes in kernel-firmware-nvidia-gspx-G06:
* update firmware to version 535.129.03
* update firmware to version 535.113.01
Changes in nvidia-open-driver-G06-signed:
* Update to version 535.129.03
* Add a devel package so other modules can be built against this one.
[jira#PED-4964]
* disabled build of nvidia-peermem module; it's no longer needed and never
worked anyway (it was only a stub) [bsc#1211892]
* preamble: added conflict to nvidia-gfxG05-kmp to prevent users from
accidently installing conflicting proprietary kernelspace drivers from CUDA
repository
* Update to version 535.113.01
* kmp-post.sh/kmp-postun.sh:
* add/remove nosimplefb=1 kernel option in order to fix Linux console also on
sle15-sp6/Leap 15.6 kernel, which will come with simpledrm support
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2023-4427=1 openSUSE-SLE-15.5-2023-4427=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2023-4427=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-4427=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4427=1
## Package List:
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-535.129.03-150500.11.9.1
* openSUSE Leap 15.5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-535.129.03_k5.14.21_150500.33.20-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-azure-535.129.03_k5.14.21_150500.33.20-150500.3.13.1
* nvidia-open-driver-G06-signed-azure-devel-535.129.03-150500.3.13.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-default-devel-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-64kb-devel-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-64kb-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-535.129.03-150500.11.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* Basesystem Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-535.129.03-150500.11.9.1
* Basesystem Module 15-SP5 (aarch64)
* nvidia-open-driver-G06-signed-64kb-devel-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-64kb-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-default-devel-535.129.03-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150500.55.31-150500.3.13.1
* Public Cloud Module 15-SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-535.129.03_k5.14.21_150500.33.20-150500.3.13.1
* nvidia-open-driver-G06-signed-kmp-azure-535.129.03_k5.14.21_150500.33.20-150500.3.13.1
* nvidia-open-driver-G06-signed-azure-devel-535.129.03-150500.3.13.1
## References:
* https://www.suse.com/security/cve/CVE-2023-31022.html
* https://bugzilla.suse.com/show_bug.cgi?id=1211892
* https://bugzilla.suse.com/show_bug.cgi?id=1216826
* https://jira.suse.com/browse/PED-4964
1
0
13 Nov '23
# Recommended update for sassc
Announcement ID: SUSE-RU-2023:4428-1
Rating: low
References:
* bsc#1201074
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that has one fix can now be installed.
## Description:
This recommended update for sassc fixes the following issues:
* No-change rebuild against a newer version of libsass (3.6.5)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4428=1
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-4428=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-4428=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4428=1
## Package List:
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libsass-devel-3.6.5-150200.4.7.1
* sassc-debuginfo-3.6.2-150200.3.5.1
* sassc-3.6.2-150200.3.5.1
* libsass-3_6_5-1-3.6.5-150200.4.7.1
* sassc-debugsource-3.6.2-150200.3.5.1
* libsass-debugsource-3.6.5-150200.4.7.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libsass-devel-3.6.5-150200.4.7.1
* libsass-debugsource-3.6.5-150200.4.7.1
* sassc-debuginfo-3.6.2-150200.3.5.1
* sassc-3.6.2-150200.3.5.1
* libsass-3_6_5-1-3.6.5-150200.4.7.1
* sassc-debugsource-3.6.2-150200.3.5.1
* libsass-3_6_5-1-debuginfo-3.6.5-150200.4.7.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libsass-devel-3.6.5-150200.4.7.1
* libsass-debugsource-3.6.5-150200.4.7.1
* sassc-debuginfo-3.6.2-150200.3.5.1
* sassc-3.6.2-150200.3.5.1
* libsass-3_6_5-1-3.6.5-150200.4.7.1
* sassc-debugsource-3.6.2-150200.3.5.1
* libsass-3_6_5-1-debuginfo-3.6.5-150200.4.7.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* libsass-3_6_5-1-3.6.5-150200.4.7.1
* libsass-devel-3.6.5-150200.4.7.1
* libsass-3_6_5-1-debuginfo-3.6.5-150200.4.7.1
* libsass-debugsource-3.6.5-150200.4.7.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1201074
1
0
SUSE-RU-2023:4416-1: low: Submit CDI to SUSE:SLE-15-SP4:Update
by maintenance@opensuse.org 13 Nov '23
by maintenance@opensuse.org 13 Nov '23
13 Nov '23
# Submit CDI to SUSE:SLE-15-SP4:Update
Announcement ID: SUSE-RU-2023:4416-1
Rating: low
References:
Affected Products:
* Containers Module 15-SP4
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
Submit CDI to SUSE:SLE-15-SP4:Update
CDI maintenance update for SLE15 SP4. Focusing primarily on rebuilding the
container images and addressing the CVEs discovered so far in the base system.
No ECO or Jira ticket required.
Released under the process described in:
https://confluence.suse.com/display/Virtualization/KubeVirt+toolstack+in+th…
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2023-4416=1
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-4416=1 SUSE-2023-4416=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-4416=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-4416=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-4416=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-4416=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-4416=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2023-4416=1
## Package List:
* openSUSE Leap Micro 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* openSUSE Leap 15.4 (x86_64)
* containerized-data-importer-api-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-importer-1.51.0-150400.4.20.2
* containerized-data-importer-importer-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-operator-1.51.0-150400.4.20.2
* containerized-data-importer-operator-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-controller-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-cloner-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-uploadproxy-1.51.0-150400.4.20.2
* containerized-data-importer-controller-1.51.0-150400.4.20.2
* containerized-data-importer-uploadserver-1.51.0-150400.4.20.2
* containerized-data-importer-uploadproxy-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-cloner-1.51.0-150400.4.20.2
* containerized-data-importer-uploadserver-debuginfo-1.51.0-150400.4.20.2
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* containerized-data-importer-api-1.51.0-150400.4.20.2
* obs-service-cdi_containers_meta-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* Containers Module 15-SP4 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
* openSUSE Leap Micro 5.3 (x86_64)
* containerized-data-importer-manifests-1.51.0-150400.4.20.2
1
0
openSUSE-SU-2023:0366-1: moderate: Security update for vlc
by opensuse-security@opensuse.org 12 Nov '23
by opensuse-security@opensuse.org 12 Nov '23
12 Nov '23
openSUSE Security Update: Security update for vlc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0366-1
Rating: moderate
References: #1206142
Cross-References: CVE-2022-37434 CVE-2022-41325 CVE-2023-5217
CVSS scores:
CVE-2022-37434 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-37434 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41325 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-5217 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-5217 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for vlc fixes the following issues:
Update to version 3.0.20:
+ Video Output:
- Fix green line in fullscreen in D3D11 video output
- Fix crash with some AMD drivers old versions
- Fix events propagation issue when double-clicking with mouse wheel
+ Decoders:
- Fix crash when AV1 hardware decoder fails
+ Interface:
- Fix annoying disappearance of the Windows fullscreen controller
+ Demuxers:
- Fix potential security issue (OOB Write) on MMS:// by checking user
size bounds
Update to version 3.0.19:
+ Core:
- Fix next-frame freezing in most scenarios
+ Demux:
- Support RIFF INFO tags for Wav files
- Fix AVI files with flipped RAW video planes
- Fix duration on short and small Ogg/Opus files
- Fix some HLS/TS streams with ID3 prefix
- Fix some HLS playlist refresh drift
- Fix for GoPro MAX spatial metadata
- Improve FFmpeg-muxed MP4 chapters handling
- Improve playback for QNap-produced AVI files
- Improve playback of some old RealVideo files
- Fix duration probing on some MP4 with missing information
+ Decoders:
- Multiple fixes on AAC handling
- Activate hardware decoding of AV1 on Windows (DxVA)
- Improve AV1 HDR support with software decoding
- Fix some AV1 GBRP streams, AV1 super-resolution streams and monochrome
ones
- Fix black screen on poorly edited MP4 files on Android Mediacodec
- Fix rawvid video in NV12
- Fix several issues on Windows hardware decoding (including "too large
resolution in DxVA")
- Improve crunchyroll-produced SSA rendering
+ Video Output:
- Super Resolution scaling with nVidia and Intel GPUs
- Fix for an issue when cropping on Direct3D9
- Multiple fixes for hardware decoding on D3D11 and OpenGL interop
- Fix an issue when playing -90°rotated video
- Fix subtitles rendering blur on recent macOS
+ Input:
- Improve SMB compatibility with Windows 11 hosts
+ Contribs:
- Update of fluidlite, fixing some MIDI rendering on Windows
- Update of zlib to 1.2.13 (CVE-2022-37434)
- Update of FFmpeg, vpx (CVE-2023-5217), ebml, dav1d, libass
+ Misc:
- Improve muxing timestamps in a few formats (reset to 0)
- Fix some rendering issues on Linux with the fullscreen controller
- Fix GOOM visualization
- Fixes for Youtube playback
- Fix some MPRIS inconsistencies that broke some OS widgets on Linux
- Implement MPRIS TrackList signals
- Fix opening files in read-only mode
- Fix password search using the Kwallet backend
- Fix some crashes on macOS when switching application
- Fix 5.1/7.1 output on macOS and tvOS
- Fix several crashes and bugs in the macOS preferences panel
- Improvements on the threading of the MMDevice audio output on Windows
- Fix a potential security issue on the uninstaller DLLs
- Fix memory leaks when using the media_list_player libVLC APIs
+ Translations:
- Update of most translations
- New translations to Esperanto, Interlingue, Lao, Macedonian, Burmese,
Odia, Samoan and Swahili
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2023-366=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64):
libvlc5-3.0.20-bp155.2.3.1
libvlccore9-3.0.20-bp155.2.3.1
vlc-3.0.20-bp155.2.3.1
vlc-codec-gstreamer-3.0.20-bp155.2.3.1
vlc-devel-3.0.20-bp155.2.3.1
vlc-jack-3.0.20-bp155.2.3.1
vlc-noX-3.0.20-bp155.2.3.1
vlc-opencv-3.0.20-bp155.2.3.1
vlc-qt-3.0.20-bp155.2.3.1
vlc-vdpau-3.0.20-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
vlc-lang-3.0.20-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2022-37434.html
https://www.suse.com/security/cve/CVE-2022-41325.html
https://www.suse.com/security/cve/CVE-2023-5217.html
https://bugzilla.suse.com/1206142
1
0
openSUSE-SU-2023:0365-1: moderate: Security update for vlc
by opensuse-security@opensuse.org 12 Nov '23
by opensuse-security@opensuse.org 12 Nov '23
12 Nov '23
openSUSE Security Update: Security update for vlc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0365-1
Rating: moderate
References:
Cross-References: CVE-2022-37434 CVE-2023-5217
CVSS scores:
CVE-2022-37434 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-37434 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-5217 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-5217 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for vlc fixes the following issues:
Update to version 3.0.20:
+ Video Output:
- Fix green line in fullscreen in D3D11 video output
- Fix crash with some AMD drivers old versions
- Fix events propagation issue when double-clicking with mouse wheel
+ Decoders:
- Fix crash when AV1 hardware decoder fails
+ Interface:
- Fix annoying disappearance of the Windows fullscreen controller
+ Demuxers:
- Fix potential security issue (OOB Write) on MMS:// by checking user
size bounds
Update to version 3.0.19:
+ Core:
- Fix next-frame freezing in most scenarios
+ Demux:
- Support RIFF INFO tags for Wav files
- Fix AVI files with flipped RAW video planes
- Fix duration on short and small Ogg/Opus files
- Fix some HLS/TS streams with ID3 prefix
- Fix some HLS playlist refresh drift
- Fix for GoPro MAX spatial metadata
- Improve FFmpeg-muxed MP4 chapters handling
- Improve playback for QNap-produced AVI files
- Improve playback of some old RealVideo files
- Fix duration probing on some MP4 with missing information
+ Decoders:
- Multiple fixes on AAC handling
- Activate hardware decoding of AV1 on Windows (DxVA)
- Improve AV1 HDR support with software decoding
- Fix some AV1 GBRP streams, AV1 super-resolution streams and monochrome
ones
- Fix black screen on poorly edited MP4 files on Android Mediacodec
- Fix rawvid video in NV12
- Fix several issues on Windows hardware decoding (including "too large
resolution in DxVA")
- Improve crunchyroll-produced SSA rendering
+ Video Output:
- Super Resolution scaling with nVidia and Intel GPUs
- Fix for an issue when cropping on Direct3D9
- Multiple fixes for hardware decoding on D3D11 and OpenGL interop
- Fix an issue when playing -90°rotated video
- Fix subtitles rendering blur on recent macOS
+ Input:
- Improve SMB compatibility with Windows 11 hosts
+ Contribs:
- Update of fluidlite, fixing some MIDI rendering on Windows
- Update of zlib to 1.2.13 (CVE-2022-37434)
- Update of FFmpeg, vpx (CVE-2023-5217), ebml, dav1d, libass
+ Misc:
- Improve muxing timestamps in a few formats (reset to 0)
- Fix some rendering issues on Linux with the fullscreen controller
- Fix GOOM visualization
- Fixes for Youtube playback
- Fix some MPRIS inconsistencies that broke some OS widgets on Linux
- Implement MPRIS TrackList signals
- Fix opening files in read-only mode
- Fix password search using the Kwallet backend
- Fix some crashes on macOS when switching application
- Fix 5.1/7.1 output on macOS and tvOS
- Fix several crashes and bugs in the macOS preferences panel
- Improvements on the threading of the MMDevice audio output on Windows
- Fix a potential security issue on the uninstaller DLLs
- Fix memory leaks when using the media_list_player libVLC APIs
+ Translations:
- Update of most translations
- New translations to Esperanto, Interlingue, Lao, Macedonian, Burmese,
Odia, Samoan and Swahili
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-365=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 ppc64le x86_64):
libvlc5-3.0.20-bp154.2.6.1
libvlccore9-3.0.20-bp154.2.6.1
vlc-3.0.20-bp154.2.6.1
vlc-codec-gstreamer-3.0.20-bp154.2.6.1
vlc-devel-3.0.20-bp154.2.6.1
vlc-jack-3.0.20-bp154.2.6.1
vlc-noX-3.0.20-bp154.2.6.1
vlc-opencv-3.0.20-bp154.2.6.1
vlc-qt-3.0.20-bp154.2.6.1
vlc-vdpau-3.0.20-bp154.2.6.1
- openSUSE Backports SLE-15-SP4 (noarch):
vlc-lang-3.0.20-bp154.2.6.1
References:
https://www.suse.com/security/cve/CVE-2022-37434.html
https://www.suse.com/security/cve/CVE-2023-5217.html
1
0
openSUSE Recommended Update: Recommended update for bluedevil5, breeze, breeze-gtk, discover, drkonqi5, kactivitymanagerd, kcm_flatpak, kcm_sddm, kde-cli-tools5, kde-gtk-config5, kgamma5, khotkeys5, kinfocenter5, kmenuedit5, kpipewire, kscreen5, kscreenlocker, ksshaskpass5, ksystemstats5, kwayland-integration, kwin5, kwrited5, layer-shell-qt, libkdecoration2, libkscreen2, libksysguard5, milou5, oxygen5, oxygen5-sounds, pam_kwallet, plasma-browser-integration, plasma-nm5, plasma-vault, plasma5-addons, plasma5-bigscreen, plasma5-desktop, plasma5-disks, plasma5-firewall, plasma5-integration, plasma5-mobile, plasma5-nano, plasma5-pa, plasma5-sdk, plasma5-systemmonitor, plasma5-thunderbolt, plasma5-welcome, plasma5-workspace, plasma5-workspace-wallpapers, plymouth-theme-breeze, polkit-kde-agent-5, powerdevil5, qqc2-breeze-style, systemsettings5, xdg-desktop-portal-kde
______________________________________________________________________________
Announcement ID: openSUSE-RU-2023:0364-1
Rating: moderate
References: #1210747
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for bluedevil5, breeze, breeze-gtk, discover, drkonqi5,
kactivitymanagerd, kcm_flatpak, kcm_sddm, kde-cli-tools5, kde-gtk-config5,
kgamma5, khotkeys5, kinfocenter5, kmenuedit5, kpipewire, kscreen5,
kscreenlocker, ksshaskpass5, ksystemstats5, kwayland-integration, kwin5,
kwrited5, layer-shell-qt, libkdecoration2, libkscreen2, libksysguard5,
milou5, oxygen5, oxygen5-sounds, pam_kwallet, plasma-browser-integration,
plasma-nm5, plasma-vault, plasma5-addons, plasma5-bigscreen,
plasma5-desktop, plasma5-disks, plasma5-firewall, plasma5-integration,
plasma5-mobile, plasma5-nano, plasma5-pa, plasma5-sdk,
plasma5-systemmonitor, plasma5-thunderbolt, plasma5-welcome,
plasma5-workspace, plasma5-workspace-wallpapers, plymouth-theme-breeze,
polkit-kde-agent-5, powerdevil5, qqc2-breeze-style, systemsettings5,
xdg-desktop-portal-kde fixes the following issues:
Update to Plasma 5.27.9 to fix high cpu usage (boo#1216913)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2023-364=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
kde-gtk-config5-5.27.9-bp155.2.3.1
kde-gtk-config5-debuginfo-5.27.9-bp155.2.3.1
kde-gtk-config5-debugsource-5.27.9-bp155.2.3.1
kde-gtk-config5-gtk3-5.27.9-bp155.2.3.1
kde-gtk-config5-gtk3-debuginfo-5.27.9-bp155.2.3.1
kgamma5-5.27.9-bp155.2.3.1
kgamma5-debuginfo-5.27.9-bp155.2.3.1
kgamma5-debugsource-5.27.9-bp155.2.3.1
ksshaskpass5-5.27.9-bp155.2.3.1
ksshaskpass5-debuginfo-5.27.9-bp155.2.3.1
ksshaskpass5-debugsource-5.27.9-bp155.2.3.1
layer-shell-qt-debugsource-5.27.9-bp155.2.3.1
layer-shell-qt5-5.27.9-bp155.2.3.1
layer-shell-qt5-debuginfo-5.27.9-bp155.2.3.1
layer-shell-qt5-devel-5.27.9-bp155.2.3.1
libkdecoration2-debuginfo-5.27.9-bp155.2.3.1
libkdecoration2-debugsource-5.27.9-bp155.2.3.1
libkdecoration2-devel-5.27.9-bp155.2.3.1
libkdecorations2-5-5.27.9-bp155.2.3.1
libkdecorations2-5-debuginfo-5.27.9-bp155.2.3.1
libkdecorations2private10-5.27.9-bp155.2.3.1
libkdecorations2private10-debuginfo-5.27.9-bp155.2.3.1
pam_kwallet-5.27.9-bp155.2.3.1
pam_kwallet-debuginfo-5.27.9-bp155.2.3.1
pam_kwallet-debugsource-5.27.9-bp155.2.3.1
plymouth-theme-breeze-5.27.9-bp155.2.3.1
plymouth-theme-breeze-debugsource-5.27.9-bp155.2.3.1
plymouth-theme-breeze-plugin-breeze-5.27.9-bp155.2.3.1
plymouth-theme-breeze-plugin-breeze-debuginfo-5.27.9-bp155.2.3.1
polkit-kde-agent-5-5.27.9-bp155.2.3.1
polkit-kde-agent-5-debuginfo-5.27.9-bp155.2.3.1
polkit-kde-agent-5-debugsource-5.27.9-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le s390x x86_64):
bluedevil5-5.27.9-bp155.2.3.1
breeze-5.27.9-bp155.2.3.1
breeze-debuginfo-5.27.9-bp155.2.3.1
breeze-debugsource-5.27.9-bp155.2.3.1
breeze5-decoration-5.27.9-bp155.2.3.1
breeze5-decoration-debuginfo-5.27.9-bp155.2.3.1
breeze5-style-5.27.9-bp155.2.3.1
breeze5-style-debuginfo-5.27.9-bp155.2.3.1
discover-5.27.9-bp155.2.3.1
discover-backend-flatpak-5.27.9-bp155.2.3.1
discover-backend-flatpak-debuginfo-5.27.9-bp155.2.3.1
discover-backend-fwupd-5.27.9-bp155.2.3.1
discover-backend-fwupd-debuginfo-5.27.9-bp155.2.3.1
discover-backend-packagekit-5.27.9-bp155.2.3.1
discover-backend-packagekit-debuginfo-5.27.9-bp155.2.3.1
discover-debuginfo-5.27.9-bp155.2.3.1
discover-debugsource-5.27.9-bp155.2.3.1
discover-notifier-5.27.9-bp155.2.3.1
discover-notifier-debuginfo-5.27.9-bp155.2.3.1
drkonqi5-5.27.9-bp155.2.3.1
drkonqi5-debuginfo-5.27.9-bp155.2.3.1
drkonqi5-debugsource-5.27.9-bp155.2.3.1
kactivitymanagerd-5.27.9-bp155.2.3.1
kactivitymanagerd-debuginfo-5.27.9-bp155.2.3.1
kactivitymanagerd-debugsource-5.27.9-bp155.2.3.1
kactivitymanagerd-lang-5.27.9-bp155.2.3.1
kcm_flatpak-5.27.9-bp155.2.3.1
kcm_flatpak-debuginfo-5.27.9-bp155.2.3.1
kcm_flatpak-debugsource-5.27.9-bp155.2.3.1
kcm_sddm-5.27.9-bp155.2.3.1
kcm_sddm-debuginfo-5.27.9-bp155.2.3.1
kcm_sddm-debugsource-5.27.9-bp155.2.3.1
kpipewire-debuginfo-5.27.9-bp155.2.3.1
kpipewire-debugsource-5.27.9-bp155.2.3.1
kpipewire-devel-5.27.9-bp155.2.3.1
kpipewire-imports-5.27.9-bp155.2.3.1
kpipewire-imports-debuginfo-5.27.9-bp155.2.3.1
kscreen5-5.27.9-bp155.2.3.1
kscreen5-debuginfo-5.27.9-bp155.2.3.1
kscreen5-debugsource-5.27.9-bp155.2.3.1
kscreen5-plasmoid-5.27.9-bp155.2.3.1
kscreenlocker-5.27.9-bp155.2.3.1
kscreenlocker-debuginfo-5.27.9-bp155.2.3.1
kscreenlocker-debugsource-5.27.9-bp155.2.3.1
kscreenlocker-devel-5.27.9-bp155.2.3.1
kwayland-integration-5.27.9-bp155.2.3.1
kwayland-integration-debuginfo-5.27.9-bp155.2.3.1
kwayland-integration-debugsource-5.27.9-bp155.2.3.1
kwin5-5.27.9-bp155.2.3.1
kwin5-debuginfo-5.27.9-bp155.2.3.1
kwin5-debugsource-5.27.9-bp155.2.3.1
kwin5-devel-5.27.9-bp155.2.3.1
kwrited5-5.27.9-bp155.2.3.1
kwrited5-debuginfo-5.27.9-bp155.2.3.1
kwrited5-debugsource-5.27.9-bp155.2.3.1
libKF5Screen8-5.27.9-bp155.2.3.1
libKF5Screen8-debuginfo-5.27.9-bp155.2.3.1
libKF5ScreenDpms8-5.27.9-bp155.2.3.1
libKF5ScreenDpms8-debuginfo-5.27.9-bp155.2.3.1
libKPipeWire5-5.27.9-bp155.2.3.1
libKPipeWire5-debuginfo-5.27.9-bp155.2.3.1
libKPipeWireDmaBuf5-5.27.9-bp155.2.3.1
libKPipeWireDmaBuf5-debuginfo-5.27.9-bp155.2.3.1
libKPipeWireRecord5-5.27.9-bp155.2.3.1
libKPipeWireRecord5-debuginfo-5.27.9-bp155.2.3.1
libKScreenLocker5-5.27.9-bp155.2.3.1
libKScreenLocker5-debuginfo-5.27.9-bp155.2.3.1
libbreezecommon5-5-5.27.9-bp155.2.3.1
libbreezecommon5-5-debuginfo-5.27.9-bp155.2.3.1
libkscreen2-debuginfo-5.27.9-bp155.2.3.1
libkscreen2-debugsource-5.27.9-bp155.2.3.1
libkscreen2-devel-5.27.9-bp155.2.3.1
libkscreen2-plugin-5.27.9-bp155.2.3.1
libkscreen2-plugin-debuginfo-5.27.9-bp155.2.3.1
metatheme-breeze-common-5.27.9-bp155.2.3.1
milou5-5.27.9-bp155.2.3.1
milou5-debuginfo-5.27.9-bp155.2.3.1
milou5-debugsource-5.27.9-bp155.2.3.1
oxygen5-5.27.9-bp155.2.3.1
oxygen5-debuginfo-5.27.9-bp155.2.3.1
oxygen5-debugsource-5.27.9-bp155.2.3.1
oxygen5-decoration-5.27.9-bp155.2.3.1
oxygen5-decoration-debuginfo-5.27.9-bp155.2.3.1
oxygen5-style-5.27.9-bp155.2.3.1
oxygen5-style-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-5.27.9-bp155.2.3.1
plasma-nm5-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-debugsource-5.27.9-bp155.2.3.1
plasma-nm5-fortisslvpn-5.27.9-bp155.2.3.1
plasma-nm5-fortisslvpn-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-iodine-5.27.9-bp155.2.3.1
plasma-nm5-iodine-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-l2tp-5.27.9-bp155.2.3.1
plasma-nm5-l2tp-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-libreswan-5.27.9-bp155.2.3.1
plasma-nm5-libreswan-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-mobile-5.27.9-bp155.2.3.1
plasma-nm5-mobile-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-openconnect-5.27.9-bp155.2.3.1
plasma-nm5-openconnect-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-openvpn-5.27.9-bp155.2.3.1
plasma-nm5-openvpn-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-pptp-5.27.9-bp155.2.3.1
plasma-nm5-pptp-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-ssh-5.27.9-bp155.2.3.1
plasma-nm5-ssh-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-sstp-5.27.9-bp155.2.3.1
plasma-nm5-sstp-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-strongswan-5.27.9-bp155.2.3.1
plasma-nm5-strongswan-debuginfo-5.27.9-bp155.2.3.1
plasma-nm5-vpnc-5.27.9-bp155.2.3.1
plasma-nm5-vpnc-debuginfo-5.27.9-bp155.2.3.1
plasma5-disks-5.27.9-bp155.2.3.1
plasma5-disks-debuginfo-5.27.9-bp155.2.3.1
plasma5-disks-debugsource-5.27.9-bp155.2.3.1
plasma5-firewall-5.27.9-bp155.2.3.1
plasma5-firewall-debuginfo-5.27.9-bp155.2.3.1
plasma5-firewall-debugsource-5.27.9-bp155.2.3.1
plasma5-integration-debugsource-5.27.9-bp155.2.3.1
plasma5-integration-devel-5.27.9-bp155.2.3.1
plasma5-integration-plugin-5.27.9-bp155.2.3.1
plasma5-integration-plugin-debuginfo-5.27.9-bp155.2.3.1
plasma5-pa-5.27.9-bp155.2.3.1
plasma5-pa-debuginfo-5.27.9-bp155.2.3.1
plasma5-pa-debugsource-5.27.9-bp155.2.3.1
plasma5-sdk-5.27.9-bp155.2.3.1
plasma5-sdk-debuginfo-5.27.9-bp155.2.3.1
plasma5-sdk-debugsource-5.27.9-bp155.2.3.1
plasma5-thunderbolt-5.27.9-bp155.2.3.1
plasma5-thunderbolt-debuginfo-5.27.9-bp155.2.3.1
plasma5-thunderbolt-debugsource-5.27.9-bp155.2.3.1
plasma5-welcome-5.27.9-bp155.2.3.1
plasma5-welcome-debuginfo-5.27.9-bp155.2.3.1
plasma5-welcome-debugsource-5.27.9-bp155.2.3.1
plasmaengineexplorer5-5.27.9-bp155.2.3.1
plasmaengineexplorer5-debuginfo-5.27.9-bp155.2.3.1
qqc2-breeze-style-5.27.9-bp155.2.3.1
qqc2-breeze-style-debuginfo-5.27.9-bp155.2.3.1
qqc2-breeze-style-debugsource-5.27.9-bp155.2.3.1
qqc2-breeze-style-devel-5.27.9-bp155.2.3.1
xdg-desktop-portal-kde-5.27.9-bp155.2.3.1
xdg-desktop-portal-kde-debuginfo-5.27.9-bp155.2.3.1
xdg-desktop-portal-kde-debugsource-5.27.9-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64):
gmenudbusmenuproxy-5.27.9-bp155.2.3.1
gmenudbusmenuproxy-debuginfo-5.27.9-bp155.2.3.1
kde-cli-tools5-5.27.9-bp155.2.3.1
kde-cli-tools5-debuginfo-5.27.9-bp155.2.3.1
kde-cli-tools5-debugsource-5.27.9-bp155.2.3.1
khotkeys5-5.27.9-bp155.2.3.1
khotkeys5-debuginfo-5.27.9-bp155.2.3.1
khotkeys5-debugsource-5.27.9-bp155.2.3.1
khotkeys5-devel-5.27.9-bp155.2.3.1
kinfocenter5-5.27.9-bp155.2.3.1
kinfocenter5-debuginfo-5.27.9-bp155.2.3.1
kinfocenter5-debugsource-5.27.9-bp155.2.3.1
kmenuedit5-5.27.9-bp155.2.3.1
kmenuedit5-debuginfo-5.27.9-bp155.2.3.1
kmenuedit5-debugsource-5.27.9-bp155.2.3.1
ksysguardsystemstats-data-5.27.9-bp155.2.3.1
ksystemstats5-5.27.9-bp155.2.3.1
ksystemstats5-debuginfo-5.27.9-bp155.2.3.1
ksystemstats5-debugsource-5.27.9-bp155.2.3.1
libKSysGuardSystemStats1-5.27.9-bp155.2.3.1
libKSysGuardSystemStats1-debuginfo-5.27.9-bp155.2.3.1
libksysguard5-5.27.9-bp155.2.3.1
libksysguard5-debuginfo-5.27.9-bp155.2.3.1
libksysguard5-debugsource-5.27.9-bp155.2.3.1
libksysguard5-devel-5.27.9-bp155.2.3.1
libksysguard5-devel-debuginfo-5.27.9-bp155.2.3.1
libksysguard5-imports-5.27.9-bp155.2.3.1
libksysguard5-imports-debuginfo-5.27.9-bp155.2.3.1
libksysguard5-plugins-5.27.9-bp155.2.3.1
libksysguard5-plugins-debuginfo-5.27.9-bp155.2.3.1
plasma-browser-integration-5.27.9-bp155.2.3.1
plasma-browser-integration-debuginfo-5.27.9-bp155.2.3.1
plasma-browser-integration-debugsource-5.27.9-bp155.2.3.1
plasma-vault-5.27.9-bp155.2.3.1
plasma-vault-debuginfo-5.27.9-bp155.2.3.1
plasma-vault-debugsource-5.27.9-bp155.2.3.1
plasma5-addons-5.27.9-bp155.2.3.1
plasma5-addons-debuginfo-5.27.9-bp155.2.3.1
plasma5-addons-debugsource-5.27.9-bp155.2.3.1
plasma5-addons-devel-5.27.9-bp155.2.3.1
plasma5-bigscreen-5.27.9-bp155.2.3.1
plasma5-bigscreen-debuginfo-5.27.9-bp155.2.3.1
plasma5-bigscreen-debugsource-5.27.9-bp155.2.3.1
plasma5-desktop-5.27.9-bp155.2.3.1
plasma5-desktop-debuginfo-5.27.9-bp155.2.3.1
plasma5-desktop-debugsource-5.27.9-bp155.2.3.1
plasma5-desktop-emojier-5.27.9-bp155.2.3.1
plasma5-desktop-emojier-debuginfo-5.27.9-bp155.2.3.1
plasma5-mobile-5.27.9-bp155.2.3.1
plasma5-mobile-debuginfo-5.27.9-bp155.2.3.1
plasma5-mobile-debugsource-5.27.9-bp155.2.3.1
plasma5-nano-5.27.9-bp155.2.3.1
plasma5-nano-debuginfo-5.27.9-bp155.2.3.1
plasma5-nano-debugsource-5.27.9-bp155.2.3.1
plasma5-session-wayland-5.27.9-bp155.2.3.1
plasma5-systemmonitor-5.27.9-bp155.2.3.1
plasma5-systemmonitor-debuginfo-5.27.9-bp155.2.3.1
plasma5-systemmonitor-debugsource-5.27.9-bp155.2.3.1
plasma5-workspace-5.27.9-bp155.2.3.1
plasma5-workspace-debuginfo-5.27.9-bp155.2.3.1
plasma5-workspace-debugsource-5.27.9-bp155.2.3.1
plasma5-workspace-devel-5.27.9-bp155.2.3.1
plasma5-workspace-libs-5.27.9-bp155.2.3.1
plasma5-workspace-libs-debuginfo-5.27.9-bp155.2.3.1
powerdevil5-5.27.9-bp155.2.3.1
powerdevil5-debuginfo-5.27.9-bp155.2.3.1
powerdevil5-debugsource-5.27.9-bp155.2.3.1
systemsettings5-5.27.9-bp155.2.3.1
systemsettings5-debuginfo-5.27.9-bp155.2.3.1
systemsettings5-debugsource-5.27.9-bp155.2.3.1
xembedsniproxy-5.27.9-bp155.2.3.1
xembedsniproxy-debuginfo-5.27.9-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (aarch64_ilp32):
pam_kwallet-64bit-5.27.9-bp155.2.3.1
pam_kwallet-64bit-debuginfo-5.27.9-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
bluedevil5-lang-5.27.9-bp155.2.3.1
breeze5-cursors-5.27.9-bp155.2.3.1
breeze5-style-lang-5.27.9-bp155.2.3.1
breeze5-wallpapers-5.27.9-bp155.2.3.1
discover-lang-5.27.9-bp155.2.3.1
drkonqi5-lang-5.27.9-bp155.2.3.1
gtk2-metatheme-breeze-5.27.9-bp155.2.3.1
gtk3-metatheme-breeze-5.27.9-bp155.2.3.1
gtk4-metatheme-breeze-5.27.9-bp155.2.3.1
kcm_flatpak-lang-5.27.9-bp155.2.3.1
kcm_sddm-lang-5.27.9-bp155.2.3.1
kde-cli-tools5-lang-5.27.9-bp155.2.3.1
kgamma5-lang-5.27.9-bp155.2.3.1
khotkeys5-lang-5.27.9-bp155.2.3.1
kinfocenter5-lang-5.27.9-bp155.2.3.1
kmenuedit5-lang-5.27.9-bp155.2.3.1
kscreen5-lang-5.27.9-bp155.2.3.1
kscreenlocker-lang-5.27.9-bp155.2.3.1
ksshaskpass5-lang-5.27.9-bp155.2.3.1
ksystemstats5-lang-5.27.9-bp155.2.3.1
kwin5-lang-5.27.9-bp155.2.3.1
libKF5Screen8-lang-5.27.9-bp155.2.3.1
libKPipeWire5-lang-5.27.9-bp155.2.3.1
libkdecorations2-5-lang-5.27.9-bp155.2.3.1
libksysguard5-lang-5.27.9-bp155.2.3.1
milou5-lang-5.27.9-bp155.2.3.1
oxygen5-cursors-5.27.9-bp155.2.3.1
oxygen5-lang-5.27.9-bp155.2.3.1
oxygen5-sounds-5.27.9-bp155.2.3.1
pam_kwallet-common-5.27.9-bp155.2.3.1
plasma-browser-integration-lang-5.27.9-bp155.2.3.1
plasma-nm5-lang-5.27.9-bp155.2.3.1
plasma-vault-backend-cryfs-5.27.9-bp155.2.3.1
plasma-vault-backend-encfs-5.27.9-bp155.2.3.1
plasma-vault-backend-gocryptfs-5.27.9-bp155.2.3.1
plasma-vault-lang-5.27.9-bp155.2.3.1
plasma5-addons-lang-5.27.9-bp155.2.3.1
plasma5-bigscreen-lang-5.27.9-bp155.2.3.1
plasma5-desktop-lang-5.27.9-bp155.2.3.1
plasma5-disks-lang-5.27.9-bp155.2.3.1
plasma5-firewall-lang-5.27.9-bp155.2.3.1
plasma5-integration-plugin-lang-5.27.9-bp155.2.3.1
plasma5-mobile-lang-5.27.9-bp155.2.3.1
plasma5-nano-lang-5.27.9-bp155.2.3.1
plasma5-pa-lang-5.27.9-bp155.2.3.1
plasma5-sdk-lang-5.27.9-bp155.2.3.1
plasma5-session-5.27.9-bp155.2.3.1
plasma5-systemmonitor-lang-5.27.9-bp155.2.3.1
plasma5-thunderbolt-lang-5.27.9-bp155.2.3.1
plasma5-welcome-lang-5.27.9-bp155.2.3.1
plasma5-workspace-lang-5.27.9-bp155.2.3.1
plasma5-workspace-wallpapers-5.27.9-bp155.2.3.1
polkit-kde-agent-5-lang-5.27.9-bp155.2.3.1
powerdevil5-lang-5.27.9-bp155.2.3.1
systemsettings5-lang-5.27.9-bp155.2.3.1
xdg-desktop-portal-kde-lang-5.27.9-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (x86_64):
pam_kwallet-32bit-5.27.9-bp155.2.3.1
pam_kwallet-32bit-debuginfo-5.27.9-bp155.2.3.1
References:
https://bugzilla.suse.com/1210747
1
0
openSUSE-SU-2023:0363-1: moderate: Security update for mupdf
by opensuse-security@opensuse.org 11 Nov '23
by opensuse-security@opensuse.org 11 Nov '23
11 Nov '23
openSUSE Security Update: Security update for mupdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0363-1
Rating: moderate
References: #1216728
Cross-References: CVE-2023-31794
CVSS scores:
CVE-2023-31794 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mupdf fixes the following issues:
- CVE-2023-31794: Fixed denial of service via crafted pdf in
pdf_mark_list_push() (boo#1216728)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2023-363=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
mupdf-1.21.1-bp155.3.3.1
mupdf-devel-static-1.21.1-bp155.3.3.1
References:
https://www.suse.com/security/cve/CVE-2023-31794.html
https://bugzilla.suse.com/1216728
1
0
SUSE-SU-2023:4414-1: important: Security update for the Linux Kernel
by maintenance@opensuse.org 10 Nov '23
by maintenance@opensuse.org 10 Nov '23
10 Nov '23
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2023:4414-1
Rating: important
References:
* bsc#1208788
* bsc#1211162
* bsc#1211307
* bsc#1212423
* bsc#1213705
* bsc#1213772
* bsc#1214754
* bsc#1214874
* bsc#1215104
* bsc#1215523
* bsc#1215545
* bsc#1215921
* bsc#1215955
* bsc#1215986
* bsc#1216062
* bsc#1216202
* bsc#1216322
* bsc#1216323
* bsc#1216324
* bsc#1216333
* bsc#1216345
* bsc#1216512
Cross-References:
* CVE-2023-2163
* CVE-2023-2860
* CVE-2023-31085
* CVE-2023-34324
* CVE-2023-3777
* CVE-2023-39189
* CVE-2023-39191
* CVE-2023-39193
* CVE-2023-45862
* CVE-2023-46813
* CVE-2023-5178
CVSS scores:
* CVE-2023-2163 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2023-2163 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-31085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-34324 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3777 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3777 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-39189 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-39189 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-39191 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-39191 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-39193 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-39193 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-45862 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-45862 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-46813 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-46813 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5178 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 11 vulnerabilities and has 11 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
* CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables
component can be exploited to achieve local privilege escalation.
(bsc#1215095)
* CVE-2023-46813: Fixed a local privilege escalation with user-space programs
that have access to MMIO regions (bsc#1212649).
* CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize)
that could cause a local DoS. (bsc#1210778)
* CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an
object could potentially extend beyond the end of an allocation causing.
(bsc#1216051)
* CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem
(bsc#1215860).
* CVE-2023-5178: Fixed an UAF in queue intialization setup. (bsc#1215768)
* CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to
unsafe code paths being incorrectly marked as safe, resulting in arbitrary
read/write in kernel memory, lateral privilege escalation, and container
escape. (bsc#1215518)
* CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling.
(bsc#1215745).
* CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a
local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read,
leading to a crash or information disclosure. (bsc#1216046)
* CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-
supplied eBPF programs that may have allowed an attacker with CAP_BPF
privileges to escalate privileges and execute arbitrary code. (bsc#1215863)
* CVE-2023-2860: Fixed an out-of-bounds read vulnerability in the processing
of seg6 attributes. This flaw allowed a privileged local user to disclose
sensitive information. (bsc#1211592)
The following non-security bugs were fixed:
* 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
* ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
* ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
* ALSA: hda/realtek - ALC287 I2S speaker platform support (git-fixes).
* ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP (git-fixes).
* ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
* ALSA: hda/realtek - Fixed two speaker platform (git-fixes).
* ALSA: hda/realtek: Add quirk for ASUS ROG GU603ZV (git-fixes).
* ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
* ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq5xxx (git-fixes).
* ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre
M70q (git-fixes).
* ALSA: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
* ALSA: hda: intel-sdw-acpi: Use u8 type for link index (git-fixes).
* ALSA: usb-audio: Fix microphone sound on Nexigo webcam (git-fixes).
* ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM (git-fixes).
* ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-
fixes).
* ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
* ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
* ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
* ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
* ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
* ASoC: pxa: fix a memory leak in probe() (git-fixes).
* Bluetooth: Avoid redundant authentication (git-fixes).
* Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
* Bluetooth: ISO: Fix handling of listen for unicast (git-fixes).
* Bluetooth: Reject connection with the device which has same BD_ADDR (git-
fixes).
* Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
* Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
* Bluetooth: hci_codec: Fix leaking content of local_codecs (git-fixes).
* Bluetooth: hci_event: Fix coding style (git-fixes).
* Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
* Bluetooth: hci_event: Ignore NULL link key (git-fixes).
* Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name
(git-fixes).
* Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
* Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
* Documentation: qat: change kernel version (PED-6401).
* Documentation: qat: rewrite description (PED-6401).
* Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-
fixes).
* Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-
fixes).
* Drop amdgpu patch causing spamming (bsc#1215523).
* HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-
fixes).
* HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
* HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-
fixes).
* HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
* HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
* HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-
fixes).
* IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
* Input: goodix - ensure int GPIO is in input for gpio_count == 1 &&
gpio_int_idx == 0 case (git-fixes).
* Input: powermate - fix use-after-free in powermate_config_complete (git-
fixes).
* Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
* Input: xpad - add PXN V900 support (git-fixes).
* KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-
fixes).
* KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway (git-fixes).
* KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes
bsc#1216512).
* KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed
(git-fixes).
* KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
* KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
(bsc#1213772).
* KVM: x86: Propagate the AMD Automatic IBRS feature to the guest
(bsc#1213772).
* KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
* KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
* KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
* NFS: Fix O_DIRECT locking issues (bsc#1211162).
* NFS: Fix a few more clear_bit() instances that need release semantics
(bsc#1211162).
* NFS: Fix a potential data corruption (bsc#1211162).
* NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
* NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
* NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
* NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
* NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
* NFSD: Never call nfsd_file_gc() in foreground paths (bsc#1215545).
* RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
* RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
* RDMA/core: Require admin capabilities to set system parameters (git-fixes)
* RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
* RDMA/mlx5: Fix NULL string error (git-fixes)
* RDMA/mlx5: Fix mutex unlocking on error flow for steering anchor creation
(git-fixes)
* RDMA/siw: Fix connection failure handling (git-fixes)
* RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
* RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
* Revert "pinctrl: avoid unsafe code pattern in find_pinctrl()" (git-fixes).
* Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux" (git-fixes).
* USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
* USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
* USB: serial: option: add entry for Sierra EM9191 with new firmware (git-
fixes).
* arm64/smmu: use TLBI ASID when invalidating entire range (bsc#1215921)
* ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
* ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
* ata: libata-core: Fix port and device removal (git-fixes).
* ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
* ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES
(git-fixes).
* blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before
init (bsc#1216062).
* blk-cgroup: support to track if policy is online (bsc#1216062).
* bonding: Fix extraction of ports from the packet headers (bsc#1214754).
* bonding: Return pointer to data after pull on skb (bsc#1214754).
* bonding: do not assume skb mac_header is set (bsc#1214754).
* bpf: Add copy_map_value_long to copy to remote percpu memory (git-fixes).
* bpf: Add missing btf_put to register_btf_id_dtor_kfuncs (git-fixes).
* bpf: Add override check to kprobe multi link attach (git-fixes).
* bpf: Add zero_map_value to zero map value with special fields (git-fixes).
* bpf: Cleanup check_refcount_ok (git-fixes).
* bpf: Fix max stack depth check for async callbacks (git-fixes).
* bpf: Fix offset calculation error in __copy_map_value and zero_map_value
(git-fixes).
* bpf: Fix ref_obj_id for dynptr data slices in verifier (git-fixes).
* bpf: Fix resetting logic for unreferenced kptrs (git-fixes).
* bpf: Fix subprog idx logic in check_max_stack_depth (git-fixes).
* bpf: Gate dynptr API behind CAP_BPF (git-fixes).
* bpf: Prevent decl_tag from being referenced in func_proto arg (git-fixes).
* bpf: Repeat check_max_stack_depth for async callbacks (git-fixes).
* bpf: Tighten ptr_to_btf_id checks (git-fixes).
* bpf: fix precision propagation verbose logging (git-fixes).
* bpf: prevent decl_tag from being referenced in func_proto (git-fixes).
* bpf: propagate precision across all frames, not just the last one (git-
fixes).
* bpf: propagate precision in ALU/ALU64 operations (git-fixes).
* btf: Export bpf_dynptr definition (git-fixes).
* btrfs: do not start transaction for scrub if the fs is mounted read-only
(bsc#1214874).
* bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
* bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-
fixes).
* ceph: add base64 endcoding routines for encrypted names (jsc#SES-1880).
* ceph: add encryption support to writepage and writepages (jsc#SES-1880).
* ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr (jsc#SES-1880).
* ceph: add helpers for converting names for userland presentation
(jsc#SES-1880).
* ceph: add infrastructure for file encryption and decryption (jsc#SES-1880).
* ceph: add new mount option to enable sparse reads (jsc#SES-1880).
* ceph: add object version support for sync read (jsc#SES-1880).
* ceph: add read/modify/write to ceph_sync_write (jsc#SES-1880).
* ceph: add some fscrypt guardrails (jsc#SES-1880).
* ceph: add support for encrypted snapshot names (jsc#SES-1880).
* ceph: add support to readdir for encrypted names (jsc#SES-1880).
* ceph: add truncate size handling support for fscrypt (jsc#SES-1880).
* ceph: align data in pages in ceph_sync_write (jsc#SES-1880).
* ceph: allow encrypting a directory while not having Ax caps (jsc#SES-1880).
* ceph: create symlinks with encrypted and base64-encoded targets
(jsc#SES-1880).
* ceph: decode alternate_name in lease info (jsc#SES-1880).
* ceph: do not use special DIO path for encrypted inodes (jsc#SES-1880).
* ceph: drop messages from MDS when unmounting (jsc#SES-1880).
* ceph: encode encrypted name in ceph_mdsc_build_path and dentry release
(jsc#SES-1880).
* ceph: fix incorrect revoked caps assert in ceph_fill_file_size()
(bsc#1216322).
* ceph: fix type promotion bug on 32bit systems (bsc#1216324).
* ceph: fix updating i_truncate_pagecache_size for fscrypt (jsc#SES-1880).
* ceph: fscrypt_auth handling for ceph (jsc#SES-1880).
* ceph: handle fscrypt fields in cap messages from MDS (jsc#SES-1880).
* ceph: implement -o test_dummy_encryption mount option (jsc#SES-1880).
* ceph: invalidate pages when doing direct/sync writes (jsc#SES-1880).
* ceph: make ceph_fill_trace and ceph_get_name decrypt names (jsc#SES-1880).
* ceph: make ceph_msdc_build_path use ref-walk (jsc#SES-1880).
* ceph: make d_revalidate call fscrypt revalidator for encrypted dentries
(jsc#SES-1880).
* ceph: make ioctl cmds more readable in debug log (jsc#SES-1880).
* ceph: make num_fwd and num_retry to __u32 (jsc#SES-1880).
* ceph: mark directory as non-complete after loading key (jsc#SES-1880).
* ceph: pass the request to parse_reply_info_readdir() (jsc#SES-1880).
* ceph: plumb in decryption during reads (jsc#SES-1880).
* ceph: preallocate inode for ops that may create one (jsc#SES-1880).
* ceph: prevent snapshot creation in encrypted locked directories
(jsc#SES-1880).
* ceph: remove unnecessary check for NULL in parse_longname() (bsc#1216333).
* ceph: send alternate_name in MClientRequest (jsc#SES-1880).
* ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open()
(jsc#SES-1880).
* ceph: size handling in MClientRequest, cap updates and inode traces
(jsc#SES-1880).
* ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper
(jsc#SES-1880).
* ceph: use osd_req_op_extent_osd_iter for netfs reads (jsc#SES-1880).
* ceph: voluntarily drop Xx caps for requests those touch parent mtime
(jsc#SES-1880).
* ceph: wait for OSD requests' callbacks to finish when unmounting
(jsc#SES-1880).
* cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem
(bsc#1215955).
* cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
* clk: tegra: fix error return case for recalc_rate (git-fixes).
* counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-
fixes).
* crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
* crypto: qat - Remove unused function declarations (PED-6401).
* crypto: qat - add fw_counters debugfs file (PED-6401).
* crypto: qat - add heartbeat counters check (PED-6401).
* crypto: qat - add heartbeat feature (PED-6401).
* crypto: qat - add internal timer for qat 4xxx (PED-6401).
* crypto: qat - add measure clock frequency (PED-6401).
* crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
* crypto: qat - add qat_zlib_deflate (PED-6401).
* crypto: qat - add support for 402xx devices (PED-6401).
* crypto: qat - change value of default idle filter (PED-6401).
* crypto: qat - delay sysfs initialization (PED-6401).
* crypto: qat - do not export adf_init_admin_pm() (PED-6401).
* crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
* crypto: qat - drop obsolete heartbeat interface (PED-6401).
* crypto: qat - drop redundant adf_enable_aer() (PED-6401).
* crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
* crypto: qat - extend buffer list logic interface (PED-6401).
* crypto: qat - extend configuration for 4xxx (PED-6401).
* crypto: qat - fix apply custom thread-service mapping for dc service
(PED-6401).
* crypto: qat - fix concurrency issue when device state changes (PED-6401).
* crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
* crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
* crypto: qat - make fw images name constant (PED-6401).
* crypto: qat - make state machine functions static (PED-6401).
* crypto: qat - move dbgfs init to separate file (PED-6401).
* crypto: qat - move returns to default case (PED-6401).
* crypto: qat - refactor device restart logic (PED-6401).
* crypto: qat - refactor fw config logic for 4xxx (PED-6401).
* crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
* crypto: qat - replace state machine calls (PED-6401).
* crypto: qat - replace the if statement with min() (PED-6401).
* crypto: qat - set deprecated capabilities as reserved (PED-6401).
* crypto: qat - unmap buffer before free for DH (PED-6401).
* crypto: qat - unmap buffers before free for RSA (PED-6401).
* crypto: qat - update slice mask for 4xxx devices (PED-6401).
* crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
* dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-
fixes).
* dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
* dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
* drm/amd/display: Do not check registers, if using AUX BL control (git-
fixes).
* drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
* drm/amd/pm: add unique_id for gc 11.0.3 (git-fixes).
* drm/amd: Fix detection of _PR3 on the PCIe root port (git-fixes).
* drm/amdgpu/nbio4.3: set proper rmmio_remap.reg_offset for SR-IOV (git-
fixes).
* drm/amdgpu/soc21: do not remap HDP registers for SR-IOV (git-fixes).
* drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
* drm/amdgpu: add missing NULL check (git-fixes).
* drm/amdkfd: Flush TLB after unmapping for GFX v9.4.3 (git-fixes).
* drm/amdkfd: Insert missing TLB flush on GFX10 and later (git-fixes).
* drm/amdkfd: Use gpu_offset for user queue's wptr (git-fixes).
* drm/atomic-helper: relax unregistered connector check (git-fixes).
* drm/bridge: ti-sn65dsi83: Do not generate HFP/HBP/HSA and EOT packet (git-
fixes).
* drm/i915/gt: Fix reservation address in ggtt_reserve_guc_top (git-fixes).
* drm/i915: Retry gtt fault when out of fence registers (git-fixes).
* drm/mediatek: Correctly free sg_table in gem prime vmap (git-fixes).
* drm/msm/dp: do not reinitialize phy unless retry during link training (git-
fixes).
* drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-
fixes).
* drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
* drm/msm/dsi: skip the wait for video mode done if not applicable (git-
fixes).
* drm/vmwgfx: fix typo of sizeof argument (git-fixes).
* drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
* firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND
(git-fixes).
* firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels()
(git-fixes).
* fprobe: Ensure running fprobe_exit_handler() finished before calling
rethook_free() (git-fixes).
* fscrypt: new helper function - fscrypt_prepare_lookup_partial()
(jsc#SES-1880).
* gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-
fixes).
* gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
* gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
* gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
* gpio: timberdale: Fix potential deadlock on &tgpio->lock (git-fixes).
* gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
* gve: Do not fully free QPL pages on prefill errors (git-fixes).
* i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
* i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-
fixes).
* i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-
fixes).
* i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
* i2c: mux: gpio:Â Replace custom acpi_get_local_address() (git-fixes).
* i2c: npcm7xx: Fix callback completion ordering (git-fixes).
* ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
* iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
* iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
* iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
* intel x86 platform vsec kABI workaround (bsc#1216202).
* io_uring/fs: remove sqe->rw_flags checking from LINKAT (git-fixes).
* io_uring/rw: defer fsnotify calls to task context (git-fixes).
* io_uring/rw: ensure kiocb_end_write() is always called (git-fixes).
* io_uring/rw: remove leftover debug statement (git-fixes).
* io_uring: Replace 0-length array with flexible array (git-fixes).
* io_uring: ensure REQ_F_ISREG is set async offload (git-fixes).
* io_uring: fix fdinfo sqe offsets calculation (git-fixes).
* io_uring: fix memory leak when removing provided buffers (git-fixes).
* iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback
(bsc#1212423).
* iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback
(bsc#1212423).
* iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support
(bsc#1212423).
* iommu/arm-smmu-v3: Fix soft lockup triggered by (bsc#1215921)
* kABI: fix bpf Tighten-ptr_to_btf_id checks (git-fixes).
* kabi: blkcg_policy_data fix KABI (bsc#1216062).
* kabi: workaround for enum nft_trans_phase (bsc#1215104).
* kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
* leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
* libceph: add CEPH_OSD_OP_ASSERT_VER support (jsc#SES-1880).
* libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type
(jsc#SES-1880).
* libceph: add sparse read support to OSD client (jsc#SES-1880).
* libceph: add sparse read support to msgr1 (jsc#SES-1880).
* libceph: add spinlock around osd->o_requests (jsc#SES-1880).
* libceph: allow ceph_osdc_new_request to accept a multi-op read
(jsc#SES-1880).
* libceph: define struct ceph_sparse_extent and add some helpers
(jsc#SES-1880).
* libceph: new sparse_read op, support sparse reads on msgr2 crc codepath
(jsc#SES-1880).
* libceph: support sparse reads on msgr2 secure codepath (jsc#SES-1880).
* libceph: use kernel_connect() (bsc#1216323).
* mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788
bsc#1213705).
* mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
* mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
* mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
* mtd: physmap-core: Restore map_rom fallback (git-fixes).
* mtd: rawnand: arasan: Ensure program page operations are successful (git-
fixes).
* mtd: rawnand: marvell: Ensure program page operations are successful (git-
fixes).
* mtd: rawnand: pl353: Ensure program page operations are successful (git-
fixes).
* mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
* mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
* net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-
fixes).
* net: mana: Fix TX CQE error handling (bsc#1215986).
* net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
* net: nfc: llcp: Add lock when modifying device list (git-fixes).
* net: rfkill: gpio: prevent value glitch during probe (git-fixes).
* net: sched: add barrier to fix packet stuck problem for lockless qdisc
(bsc#1216345).
* net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog
(bsc#1216345).
* net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-
fixes).
* net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-
fixes).
* net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
* net: use sk_is_tcp() in more places (git-fixes).
* netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound
set/chain (git-fixes).
* netfilter: nf_tables: unbind non-anonymous set if rule construction fails
(git-fixes).
* nfc: nci: assert requested protocol is valid (git-fixes).
* nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-
fixes).
* nfs: only issue commit in DIO codepath if we have uncommitted data
(bsc#1211162).
* nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
(git-fixes).
* nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()
(bsc#1214842).
* phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
* phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
* phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
* pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
* pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
* platform/surface: platform_profile: Propagate error if profile registration
fails (git-fixes).
* platform/x86/intel/pmt: Ignore uninitialized entries (bsc#1216202).
* platform/x86/intel/pmt: telemetry: Fix fixed region handling (bsc#1216202).
* platform/x86/intel/vsec: Rework early hardware code (bsc#1216202).
* platform/x86/intel: Fix 'rmmod pmt_telemetry' panic (bsc#1216202).
* platform/x86/intel: Fix pmt_crashlog array reference (bsc#1216202).
* platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e
(git-fixes).
* platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-
fixes).
* platform/x86: think-lmi: Fix reference leak (git-fixes).
* platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
* power: supply: ucs1002: fix error code in ucs1002_get_property() (git-
fixes).
* quota: Fix slow quotaoff (bsc#1216621).
* r8152: check budget for r8152_poll() (git-fixes).
* regmap: fix NULL deref on lookup (git-fixes).
* regmap: rbtree: Fix wrong register marked as in-cache when creating new node
(git-fixes).
* remove unnecessary WARN_ON_ONCE() (bsc#1214823).
* ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
* ring-buffer: Do not attempt to read past "commit" (git-fixes).
* ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
* ring-buffer: Update "shortest_full" in polling (git-fixes).
* s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
* s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
* sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
* sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity()
(git fixes (sched)).
* sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes
(sched)).
* sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
* scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).
* scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock (git-fixes).
* scsi: iscsi: Add length check for nlattr payload (git-fixes).
* scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).
* scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).
* scsi: mpi3mr: Propagate sense data for admin queue SCSI I/O (git-fixes).
* scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-
fixes).
* scsi: pm8001: Setup IRQs on resume (git-fixes).
* scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read()
directly (git-fixes).
* scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read()
directly (git-fixes).
* scsi: qedf: Do not touch __user pointer in
qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).
* scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes).
* scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).
* selftests/bpf: Add more tests for check_max_stack_depth bug (git-fixes).
* selftests/bpf: Add reproducer for decl_tag in func_proto argument (git-
fixes).
* selftests/bpf: Add reproducer for decl_tag in func_proto return type (git-
fixes).
* selftests/bpf: Add selftest for check_stack_max_depth bug (git-fixes).
* selftests/bpf: Clean up sys_nanosleep uses (git-fixes).
* serial: 8250_port: Check IRQ data before use (git-fixes).
* soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-
fixes).
* spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
* spi: stm32: add a delay before SPI disable (git-fixes).
* spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain
(git-fixes).
* spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
* thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-
fixes).
* thunderbolt: Restart XDomain discovery handshake after failure (git-fixes).
* thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple
Ridge (git-fixes).
* tracing: Have current_trace inc the trace array ref count (git-fixes).
* tracing: Have event inject files inc the trace array ref count (git-fixes).
* tracing: Have option files inc the trace array ref count (git-fixes).
* tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
* tracing: Increase trace array ref count on enable and filter files (git-
fixes).
* tracing: Make trace_marker{,_raw} stream-like (git-fixes).
* usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
* usb: dwc3: Soft reset phy on probe for host (git-fixes).
* usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-
fixes).
* usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
* usb: hub: Guard against accesses to uninitialized BOS descriptors (git-
fixes).
* usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
* usb: musb: Modify the "HWVers" register address (git-fixes).
* usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-
fixes).
* usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails (git-
fixes).
* usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
* vmbus_testing: fix wrong python syntax for integer value comparison (git-
fixes).
* vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
* watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
* watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running
(git-fixes).
* wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
* wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
* wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
* wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
* wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
* wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-
fixes).
* wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
* wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-
fixes).
* wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
* wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
* x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
* x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
* x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
* x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf
(bsc#1213772).
* x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
* x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
* x86/mm: Print the encryption features correctly when a paravisor is present
(bsc#1206453).
* x86/platform/uv: Use alternate source for socket to node data (bsc#1215696).
* x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
* x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
* x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
* x86/sev: Make enc_dec_hypercall() accept a size instead of npages
(bsc#1214635).
* xen-netback: use default TX queue size for vifs (git-fixes).
* xhci: Keep interrupt disabled in initialization until host is running (git-
fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2023-4414=1 openSUSE-SLE-15.5-2023-4414=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4414=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* dlm-kmp-azure-5.14.21-150500.33.23.1
* kernel-azure-debugsource-5.14.21-150500.33.23.1
* reiserfs-kmp-azure-5.14.21-150500.33.23.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* gfs2-kmp-azure-5.14.21-150500.33.23.1
* kernel-azure-debuginfo-5.14.21-150500.33.23.1
* cluster-md-kmp-azure-5.14.21-150500.33.23.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.23.1
* kernel-syms-azure-5.14.21-150500.33.23.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* ocfs2-kmp-azure-5.14.21-150500.33.23.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.23.1
* kernel-azure-devel-5.14.21-150500.33.23.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.23.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* kernel-azure-optional-5.14.21-150500.33.23.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.23.1
* kernel-azure-extra-5.14.21-150500.33.23.1
* kselftests-kmp-azure-5.14.21-150500.33.23.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.23.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.23.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.23.1
* kernel-azure-vdso-5.14.21-150500.33.23.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.23.1
* kernel-devel-azure-5.14.21-150500.33.23.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.23.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-debugsource-5.14.21-150500.33.23.1
* kernel-azure-devel-5.14.21-150500.33.23.1
* kernel-syms-azure-5.14.21-150500.33.23.1
* kernel-azure-debuginfo-5.14.21-150500.33.23.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.23.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.23.1
* kernel-devel-azure-5.14.21-150500.33.23.1
## References:
* https://www.suse.com/security/cve/CVE-2023-2163.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-31085.html
* https://www.suse.com/security/cve/CVE-2023-34324.html
* https://www.suse.com/security/cve/CVE-2023-3777.html
* https://www.suse.com/security/cve/CVE-2023-39189.html
* https://www.suse.com/security/cve/CVE-2023-39191.html
* https://www.suse.com/security/cve/CVE-2023-39193.html
* https://www.suse.com/security/cve/CVE-2023-45862.html
* https://www.suse.com/security/cve/CVE-2023-46813.html
* https://www.suse.com/security/cve/CVE-2023-5178.html
* https://bugzilla.suse.com/show_bug.cgi?id=1208788
* https://bugzilla.suse.com/show_bug.cgi?id=1211162
* https://bugzilla.suse.com/show_bug.cgi?id=1211307
* https://bugzilla.suse.com/show_bug.cgi?id=1212423
* https://bugzilla.suse.com/show_bug.cgi?id=1213705
* https://bugzilla.suse.com/show_bug.cgi?id=1213772
* https://bugzilla.suse.com/show_bug.cgi?id=1214754
* https://bugzilla.suse.com/show_bug.cgi?id=1214874
* https://bugzilla.suse.com/show_bug.cgi?id=1215104
* https://bugzilla.suse.com/show_bug.cgi?id=1215523
* https://bugzilla.suse.com/show_bug.cgi?id=1215545
* https://bugzilla.suse.com/show_bug.cgi?id=1215921
* https://bugzilla.suse.com/show_bug.cgi?id=1215955
* https://bugzilla.suse.com/show_bug.cgi?id=1215986
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1216202
* https://bugzilla.suse.com/show_bug.cgi?id=1216322
* https://bugzilla.suse.com/show_bug.cgi?id=1216323
* https://bugzilla.suse.com/show_bug.cgi?id=1216324
* https://bugzilla.suse.com/show_bug.cgi?id=1216333
* https://bugzilla.suse.com/show_bug.cgi?id=1216345
* https://bugzilla.suse.com/show_bug.cgi?id=1216512
1
0