openSUSE Updates
Threads by month
- ----- 2024 -----
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2023
- 3 participants
- 197 discussions
27 Sep '23
# Security update for cni
Announcement ID: SUSE-SU-2023:3815-1
Rating: important
References:
* #1212475
Affected Products:
* Containers Module 15-SP4
* openSUSE Leap 15.4
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP1
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.0
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.0
* SUSE Manager Server 4.1
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of cni fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3815=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3815=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3815=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3815=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3815=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-3815=1
* Public Cloud Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3815=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3815=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3815=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3815=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3815=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3815=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3815=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3815=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3815=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3815=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3815=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3815=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3815=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3815=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3815=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3815=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* cni-0.7.1-150100.3.14.1
* Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64)
* cni-0.7.1-150100.3.14.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE CaaS Platform 4.0 (x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* cni-0.7.1-150100.3.14.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0
SUSE-SU-2023:3816-1: important: Security update for cni-plugins
by maintenance@opensuse.org 27 Sep '23
by maintenance@opensuse.org 27 Sep '23
27 Sep '23
# Security update for cni-plugins
Announcement ID: SUSE-SU-2023:3816-1
Rating: important
References:
* #1212475
Affected Products:
* Containers Module 15-SP4
* openSUSE Leap 15.4
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP1
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.0
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.0
* SUSE Manager Server 4.1
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of cni-plugins fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3816=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3816=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3816=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3816=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3816=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-3816=1
* Public Cloud Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3816=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3816=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3816=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3816=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3816=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3816=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3816=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3816=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3816=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3816=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3816=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3816=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3816=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3816=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3816=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3816=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE CaaS Platform 4.0 (x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.17.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0
SUSE-SU-2023:3817-1: important: Security update for containerd
by maintenance@opensuse.org 27 Sep '23
by maintenance@opensuse.org 27 Sep '23
27 Sep '23
# Security update for containerd
Announcement ID: SUSE-SU-2023:3817-1
Rating: important
References:
* #1212475
Affected Products:
* Containers Module 15-SP4
* Containers Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one security fix can now be installed.
## Description:
This update of containerd fixes the following issues:
* rebuild the package with the go 1.21 security release (bsc#1212475).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3817=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3817=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3817=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3817=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3817=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3817=1
* Containers Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-3817=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2023-3817=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3817=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3817=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3817=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3817=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3817=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3817=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3817=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3817=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3817=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3817=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3817=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3817=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3817=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3817=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* containerd-devel-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* containerd-devel-1.6.21-150000.95.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* containerd-devel-1.6.21-150000.95.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE CaaS Platform 4.0 (x86_64)
* containerd-ctr-1.6.21-150000.95.1
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* containerd-1.6.21-150000.95.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
1
0
27 Sep '23
# Security update for ffmpeg
Announcement ID: SUSE-SU-2023:3818-1
Rating: moderate
References:
* #1214246
Cross-References:
* CVE-2021-28429
CVSS scores:
* CVE-2021-28429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-28429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP4
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP4
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for ffmpeg fixes the following issues:
* CVE-2021-28429: Fixed Integer overflow vulnerability in
av_timecode_make_string in libavutil/timecode.c (bsc#1214246).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3818=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3818=1
* Desktop Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3818=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3818=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3818=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3818=1
* SUSE Linux Enterprise Workstation Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-3818=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2023-3818=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libavresample3-3.4.2-150200.11.31.1
* libavutil55-debuginfo-3.4.2-150200.11.31.1
* libavutil-devel-3.4.2-150200.11.31.1
* libpostproc-devel-3.4.2-150200.11.31.1
* libswscale4-debuginfo-3.4.2-150200.11.31.1
* libavformat57-debuginfo-3.4.2-150200.11.31.1
* libavfilter-devel-3.4.2-150200.11.31.1
* libavformat57-3.4.2-150200.11.31.1
* libavdevice57-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-3.4.2-150200.11.31.1
* libavcodec-devel-3.4.2-150200.11.31.1
* libavutil55-3.4.2-150200.11.31.1
* libavfilter6-3.4.2-150200.11.31.1
* libavcodec57-debuginfo-3.4.2-150200.11.31.1
* libavcodec57-3.4.2-150200.11.31.1
* libswresample2-debuginfo-3.4.2-150200.11.31.1
* libswscale-devel-3.4.2-150200.11.31.1
* libavresample3-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-3.4.2-150200.11.31.1
* libswresample2-3.4.2-150200.11.31.1
* libavfilter6-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-private-devel-3.4.2-150200.11.31.1
* libswresample-devel-3.4.2-150200.11.31.1
* libavdevice57-3.4.2-150200.11.31.1
* libpostproc54-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libavdevice-devel-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavformat-devel-3.4.2-150200.11.31.1
* libavresample-devel-3.4.2-150200.11.31.1
* libswscale4-3.4.2-150200.11.31.1
* openSUSE Leap 15.4 (x86_64)
* libavcodec57-32bit-debuginfo-3.4.2-150200.11.31.1
* libswscale4-32bit-debuginfo-3.4.2-150200.11.31.1
* libavresample3-32bit-3.4.2-150200.11.31.1
* libpostproc54-32bit-debuginfo-3.4.2-150200.11.31.1
* libavdevice57-32bit-3.4.2-150200.11.31.1
* libavutil55-32bit-3.4.2-150200.11.31.1
* libswresample2-32bit-debuginfo-3.4.2-150200.11.31.1
* libavformat57-32bit-debuginfo-3.4.2-150200.11.31.1
* libavdevice57-32bit-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-32bit-debuginfo-3.4.2-150200.11.31.1
* libavcodec57-32bit-3.4.2-150200.11.31.1
* libavresample3-32bit-debuginfo-3.4.2-150200.11.31.1
* libswresample2-32bit-3.4.2-150200.11.31.1
* libavformat57-32bit-3.4.2-150200.11.31.1
* libpostproc54-32bit-3.4.2-150200.11.31.1
* libavutil55-32bit-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-32bit-3.4.2-150200.11.31.1
* libswscale4-32bit-3.4.2-150200.11.31.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libavresample3-3.4.2-150200.11.31.1
* libavutil55-debuginfo-3.4.2-150200.11.31.1
* libavutil-devel-3.4.2-150200.11.31.1
* libpostproc-devel-3.4.2-150200.11.31.1
* libswscale4-debuginfo-3.4.2-150200.11.31.1
* libavformat57-debuginfo-3.4.2-150200.11.31.1
* libavfilter-devel-3.4.2-150200.11.31.1
* libavformat57-3.4.2-150200.11.31.1
* libavdevice57-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-3.4.2-150200.11.31.1
* libavcodec-devel-3.4.2-150200.11.31.1
* libavutil55-3.4.2-150200.11.31.1
* libavfilter6-3.4.2-150200.11.31.1
* libavcodec57-debuginfo-3.4.2-150200.11.31.1
* libavcodec57-3.4.2-150200.11.31.1
* libswresample2-debuginfo-3.4.2-150200.11.31.1
* libswscale-devel-3.4.2-150200.11.31.1
* libavresample3-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-3.4.2-150200.11.31.1
* libswresample2-3.4.2-150200.11.31.1
* libavfilter6-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-private-devel-3.4.2-150200.11.31.1
* libswresample-devel-3.4.2-150200.11.31.1
* libavdevice57-3.4.2-150200.11.31.1
* libpostproc54-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libavdevice-devel-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavformat-devel-3.4.2-150200.11.31.1
* libavresample-devel-3.4.2-150200.11.31.1
* libswscale4-3.4.2-150200.11.31.1
* openSUSE Leap 15.5 (x86_64)
* libavcodec57-32bit-debuginfo-3.4.2-150200.11.31.1
* libswscale4-32bit-debuginfo-3.4.2-150200.11.31.1
* libavresample3-32bit-3.4.2-150200.11.31.1
* libpostproc54-32bit-debuginfo-3.4.2-150200.11.31.1
* libavdevice57-32bit-3.4.2-150200.11.31.1
* libavutil55-32bit-3.4.2-150200.11.31.1
* libswresample2-32bit-debuginfo-3.4.2-150200.11.31.1
* libavformat57-32bit-debuginfo-3.4.2-150200.11.31.1
* libavdevice57-32bit-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-32bit-debuginfo-3.4.2-150200.11.31.1
* libavcodec57-32bit-3.4.2-150200.11.31.1
* libavresample3-32bit-debuginfo-3.4.2-150200.11.31.1
* libswresample2-32bit-3.4.2-150200.11.31.1
* libavformat57-32bit-3.4.2-150200.11.31.1
* libpostproc54-32bit-3.4.2-150200.11.31.1
* libavutil55-32bit-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-32bit-3.4.2-150200.11.31.1
* libswscale4-32bit-3.4.2-150200.11.31.1
* Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libavcodec57-3.4.2-150200.11.31.1
* libswresample2-debuginfo-3.4.2-150200.11.31.1
* libavresample3-debuginfo-3.4.2-150200.11.31.1
* libavresample3-3.4.2-150200.11.31.1
* libavutil55-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-3.4.2-150200.11.31.1
* libavutil-devel-3.4.2-150200.11.31.1
* libswresample2-3.4.2-150200.11.31.1
* libavutil55-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libpostproc-devel-3.4.2-150200.11.31.1
* libswresample-devel-3.4.2-150200.11.31.1
* libswscale-devel-3.4.2-150200.11.31.1
* libswscale4-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavformat57-debuginfo-3.4.2-150200.11.31.1
* libswscale4-3.4.2-150200.11.31.1
* libavcodec57-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-debuginfo-3.4.2-150200.11.31.1
* libavformat57-3.4.2-150200.11.31.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libswresample2-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-3.4.2-150200.11.31.1
* libavutil55-debuginfo-3.4.2-150200.11.31.1
* libavutil-devel-3.4.2-150200.11.31.1
* libswresample2-3.4.2-150200.11.31.1
* libavutil55-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libpostproc-devel-3.4.2-150200.11.31.1
* libswresample-devel-3.4.2-150200.11.31.1
* libswscale-devel-3.4.2-150200.11.31.1
* libswscale4-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libswscale4-3.4.2-150200.11.31.1
* libavcodec57-debuginfo-3.4.2-150200.11.31.1
* libpostproc54-debuginfo-3.4.2-150200.11.31.1
* libavcodec57-3.4.2-150200.11.31.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* libavdevice57-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-3.4.2-150200.11.31.1
* libavfilter6-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavdevice57-3.4.2-150200.11.31.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libavdevice57-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-3.4.2-150200.11.31.1
* libavfilter6-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* libavfilter6-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavdevice57-3.4.2-150200.11.31.1
* SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64)
* libavresample3-debuginfo-3.4.2-150200.11.31.1
* libavresample3-3.4.2-150200.11.31.1
* libavcodec-devel-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavformat-devel-3.4.2-150200.11.31.1
* libavformat57-debuginfo-3.4.2-150200.11.31.1
* libavresample-devel-3.4.2-150200.11.31.1
* libavformat57-3.4.2-150200.11.31.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* libavresample3-debuginfo-3.4.2-150200.11.31.1
* libavresample3-3.4.2-150200.11.31.1
* libavcodec-devel-3.4.2-150200.11.31.1
* ffmpeg-debuginfo-3.4.2-150200.11.31.1
* ffmpeg-debugsource-3.4.2-150200.11.31.1
* libavformat-devel-3.4.2-150200.11.31.1
* libavformat57-debuginfo-3.4.2-150200.11.31.1
* libavresample-devel-3.4.2-150200.11.31.1
* libavformat57-3.4.2-150200.11.31.1
## References:
* https://www.suse.com/security/cve/CVE-2021-28429.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214246
1
0
27 Sep '23
# Security update for busybox
Announcement ID: SUSE-SU-2023:3820-1
Rating: important
References:
* #1214538
Cross-References:
* CVE-2022-48174
CVSS scores:
* CVE-2022-48174 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48174 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for busybox fixes the following issues:
* CVE-2022-48174: Fixed stack overflow vulnerability. (bsc#1214538)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2023-3820=1 openSUSE-SLE-15.5-2023-3820=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3820=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* busybox-kmod-1.35.0-150500.7.2.3
* busybox-bind-utils-1.35.0-150500.7.2.3
* busybox-iproute2-1.35.0-150500.7.2.3
* busybox-misc-1.35.0-150500.7.2.3
* busybox-sysvinit-tools-1.35.0-150500.7.2.3
* busybox-links-1.35.0-150500.7.2.3
* busybox-whois-1.35.0-150500.7.2.3
* busybox-sharutils-1.35.0-150500.7.2.3
* busybox-patch-1.35.0-150500.7.2.3
* busybox-gawk-1.35.0-150500.7.2.3
* busybox-kbd-1.35.0-150500.7.2.3
* busybox-less-1.35.0-150500.7.2.3
* busybox-procps-1.35.0-150500.7.2.3
* busybox-adduser-1.35.0-150500.7.2.3
* busybox-net-tools-1.35.0-150500.7.2.3
* busybox-time-1.35.0-150500.7.2.3
* busybox-tunctl-1.35.0-150500.7.2.3
* busybox-tftp-1.35.0-150500.7.2.3
* busybox-unzip-1.35.0-150500.7.2.3
* busybox-ed-1.35.0-150500.7.2.3
* busybox-sed-1.35.0-150500.7.2.3
* busybox-vi-1.35.0-150500.7.2.3
* busybox-vlan-1.35.0-150500.7.2.3
* busybox-gzip-1.35.0-150500.7.2.3
* busybox-dos2unix-1.35.0-150500.7.2.3
* busybox-selinux-tools-1.35.0-150500.7.2.3
* busybox-xz-1.35.0-150500.7.2.3
* busybox-grep-1.35.0-150500.7.2.3
* busybox-policycoreutils-1.35.0-150500.7.2.3
* busybox-wget-1.35.0-150500.7.2.3
* busybox-iputils-1.35.0-150500.7.2.3
* busybox-which-1.35.0-150500.7.2.3
* busybox-bzip2-1.35.0-150500.7.2.3
* busybox-diffutils-1.35.0-150500.7.2.3
* busybox-attr-1.35.0-150500.7.2.3
* busybox-psmisc-1.35.0-150500.7.2.3
* busybox-util-linux-1.35.0-150500.7.2.3
* busybox-bc-1.35.0-150500.7.2.3
* busybox-traceroute-1.35.0-150500.7.2.3
* busybox-tar-1.35.0-150500.7.2.3
* busybox-ncurses-utils-1.35.0-150500.7.2.3
* busybox-cpio-1.35.0-150500.7.2.3
* busybox-coreutils-1.35.0-150500.7.2.3
* busybox-findutils-1.35.0-150500.7.2.3
* busybox-sendmail-1.35.0-150500.7.2.3
* busybox-sh-1.35.0-150500.7.2.3
* busybox-netcat-1.35.0-150500.7.2.3
* busybox-telnet-1.35.0-150500.7.2.3
* busybox-hostname-1.35.0-150500.7.2.3
* busybox-man-1.35.0-150500.7.2.3
* busybox-syslogd-1.35.0-150500.7.2.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* busybox-1.35.0-150500.10.3.3
* busybox-static-1.35.0-150500.10.3.3
* busybox-testsuite-1.35.0-150500.10.3.3
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* busybox-warewulf3-1.35.0-150500.10.3.3
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* busybox-1.35.0-150500.10.3.3
* busybox-static-1.35.0-150500.10.3.3
## References:
* https://www.suse.com/security/cve/CVE-2022-48174.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214538
1
0
27 Sep '23
# Security update for bind
Announcement ID: SUSE-SU-2023:3821-1
Rating: important
References:
* #1215472
Cross-References:
* CVE-2023-3341
CVSS scores:
* CVE-2023-3341 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3341 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for bind fixes the following issues:
Update to release 9.16.44:
* CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause
named to terminate unexpectedly (bsc#1215472).
Update to release 9.16.43
* Processing already-queued queries received over TCP could cause an assertion
failure, when the server was reconfigured at the same time or the cache was
being flushed. This has been fixed.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2023-3821=1 openSUSE-SLE-15.5-2023-3821=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3821=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-3821=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* bind-debuginfo-9.16.44-150500.8.12.2
* bind-utils-9.16.44-150500.8.12.2
* bind-debugsource-9.16.44-150500.8.12.2
* bind-9.16.44-150500.8.12.2
* bind-utils-debuginfo-9.16.44-150500.8.12.2
* openSUSE Leap 15.5 (noarch)
* bind-doc-9.16.44-150500.8.12.2
* python3-bind-9.16.44-150500.8.12.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bind-debugsource-9.16.44-150500.8.12.2
* bind-utils-debuginfo-9.16.44-150500.8.12.2
* bind-utils-9.16.44-150500.8.12.2
* bind-debuginfo-9.16.44-150500.8.12.2
* Basesystem Module 15-SP5 (noarch)
* python3-bind-9.16.44-150500.8.12.2
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bind-debugsource-9.16.44-150500.8.12.2
* bind-9.16.44-150500.8.12.2
* bind-debuginfo-9.16.44-150500.8.12.2
* Server Applications Module 15-SP5 (noarch)
* bind-doc-9.16.44-150500.8.12.2
## References:
* https://www.suse.com/security/cve/CVE-2023-3341.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215472
1
0
SUSE-SU-2023:3822-1: moderate: Security update for supportutils
by maintenance@opensuse.org 27 Sep '23
by maintenance@opensuse.org 27 Sep '23
27 Sep '23
# Security update for supportutils
Announcement ID: SUSE-SU-2023:3822-1
Rating: moderate
References:
* #1181477
* #1196933
* #1204942
* #1205533
* #1206402
* #1206608
* #1207543
* #1207598
* #1208928
* #1209979
* #1210015
* #1210950
* #1211598
* #1211599
* #1213127
* PED-1703
Cross-References:
* CVE-2022-45154
CVSS scores:
* CVE-2022-45154 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-45154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that solves one vulnerability, contains one feature and has 14
security fixes can now be installed.
## Description:
This update for supportutils fixes the following issues:
Security fixes:
* CVE-2022-45154: Removed iSCSI passwords (bsc#1207598).
Other Fixes:
* Changes in version 3.1.26
* powerpc plugin to collect the slots and active memory (bsc#1210950)
* A Cleartext Storage of Sensitive Information vulnerability CVE-2022-45154
* supportconfig: collect BPF information (pr#154)
* Added additional iscsi information (pr#155)
* Added run time detection (bsc#1213127)
* Changes for supportutils version 3.1.25
* Removed iSCSI passwords CVE-2022-45154 (bsc#1207598)
* powerpc: Collect lsslot,amsstat, and opal elogs (pr#149)
* powerpc: collect invscout logs (pr#150)
* powerpc: collect RMC status logs (pr#151)
* Added missing nvme nbft commands (bsc#1211599)
* Fixed invalid nvme commands (bsc#1211598)
* Added missing podman information (PED-1703, bsc#1181477)
* Removed dependency on sysfstools
* Check for systool use (bsc#1210015)
* Added selinux checking (bsc#1209979)
* Updated SLES_VER matrix
* Fixed missing status detail for apparmor (bsc#1196933)
* Corrected invalid argument list in docker.txt (bsc#1206608)
* Applies limit equally to sar data and text files (bsc#1207543)
* Collects hwinfo hardware logs (bsc#1208928)
* Collects lparnumascore logs (issue#148)
* Add dependency to `numactl` on ppc64le and `s390x`, this enforces that
`numactl --hardware` data is provided in supportconfigs
* Changes to supportconfig.rc version 3.1.11-35
* Corrected _sanitize_file to include iscsi.conf and others (bsc#1206402)
* Changes to supportconfig version 3.1.11-46.4
* Added plymouth_info
* Changes to getappcore version 1.53.02
* The location of chkbin was updated earlier. This documents that change
(bsc#1205533, bsc#1204942)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3822=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3822=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3822=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3822=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3822=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3822=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3822=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3822=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3822=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3822=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3822=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3822=1
* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3822=1
* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-3822=1
* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3822=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3822=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3822=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3822=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3822=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* openSUSE Leap 15.5 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* Basesystem Module 15-SP4 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* Basesystem Module 15-SP5 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Manager Proxy 4.2 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Manager Retail Branch Server 4.2 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Manager Server 4.2 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Enterprise Storage 7.1 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* supportutils-3.1.26-150300.7.35.21.1
## References:
* https://www.suse.com/security/cve/CVE-2022-45154.html
* https://bugzilla.suse.com/show_bug.cgi?id=1181477
* https://bugzilla.suse.com/show_bug.cgi?id=1196933
* https://bugzilla.suse.com/show_bug.cgi?id=1204942
* https://bugzilla.suse.com/show_bug.cgi?id=1205533
* https://bugzilla.suse.com/show_bug.cgi?id=1206402
* https://bugzilla.suse.com/show_bug.cgi?id=1206608
* https://bugzilla.suse.com/show_bug.cgi?id=1207543
* https://bugzilla.suse.com/show_bug.cgi?id=1207598
* https://bugzilla.suse.com/show_bug.cgi?id=1208928
* https://bugzilla.suse.com/show_bug.cgi?id=1209979
* https://bugzilla.suse.com/show_bug.cgi?id=1210015
* https://bugzilla.suse.com/show_bug.cgi?id=1210950
* https://bugzilla.suse.com/show_bug.cgi?id=1211598
* https://bugzilla.suse.com/show_bug.cgi?id=1211599
* https://bugzilla.suse.com/show_bug.cgi?id=1213127
* https://jira.suse.com/browse/PED-1703
1
0
27 Sep '23
# Security update for curl
Announcement ID: SUSE-SU-2023:3823-1
Rating: important
References:
* #1215026
Cross-References:
* CVE-2023-38039
CVSS scores:
* CVE-2023-38039 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38039 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header.
(bsc#1215026)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2023-3823=1 openSUSE-SLE-15.4-2023-3823=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3823=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3823=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2023-3823=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3823=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2023-3823=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3823=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3823=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl-devel-8.0.1-150400.5.29.1
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* openSUSE Leap 15.4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.29.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.29.1
* libcurl-devel-32bit-8.0.1-150400.5.29.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl4-64bit-debuginfo-8.0.1-150400.5.29.1
* libcurl4-64bit-8.0.1-150400.5.29.1
* libcurl-devel-64bit-8.0.1-150400.5.29.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl-devel-8.0.1-150400.5.29.1
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* openSUSE Leap 15.5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.29.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.29.1
* libcurl-devel-32bit-8.0.1-150400.5.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libcurl-devel-8.0.1-150400.5.29.1
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* Basesystem Module 15-SP4 (x86_64)
* libcurl4-32bit-debuginfo-8.0.1-150400.5.29.1
* libcurl4-32bit-8.0.1-150400.5.29.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl-devel-8.0.1-150400.5.29.1
* curl-debuginfo-8.0.1-150400.5.29.1
* curl-debugsource-8.0.1-150400.5.29.1
* libcurl4-debuginfo-8.0.1-150400.5.29.1
* curl-8.0.1-150400.5.29.1
* libcurl4-8.0.1-150400.5.29.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-debuginfo-8.0.1-150400.5.29.1
* libcurl4-32bit-8.0.1-150400.5.29.1
## References:
* https://www.suse.com/security/cve/CVE-2023-38039.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215026
1
0
SUSE-SU-2023:3824-1: important: Security update for python310
by maintenance@opensuse.org 27 Sep '23
by maintenance@opensuse.org 27 Sep '23
27 Sep '23
# Security update for python310
Announcement ID: SUSE-SU-2023:3824-1
Rating: important
References:
* #1213463
* #1214692
Cross-References:
* CVE-2023-40217
CVSS scores:
* CVE-2023-40217 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2023-40217 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Python 3 Module 15-SP4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for python310 fixes the following issues:
* Update to 3.10.13.
* CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692)
The following non-security bug was fixed:
* stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2023-3824=1 openSUSE-SLE-15.4-2023-3824=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3824=1
* Python 3 Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Python3-15-SP4-2023-3824=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python310-debugsource-3.10.13-150400.4.33.1
* python310-3.10.13-150400.4.33.1
* python310-testsuite-3.10.13-150400.4.33.1
* python310-tools-3.10.13-150400.4.33.1
* python310-core-debugsource-3.10.13-150400.4.33.1
* python310-tk-debuginfo-3.10.13-150400.4.33.1
* python310-dbm-debuginfo-3.10.13-150400.4.33.1
* python310-idle-3.10.13-150400.4.33.1
* python310-curses-3.10.13-150400.4.33.1
* python310-base-3.10.13-150400.4.33.1
* libpython3_10-1_0-3.10.13-150400.4.33.1
* python310-curses-debuginfo-3.10.13-150400.4.33.1
* python310-base-debuginfo-3.10.13-150400.4.33.1
* python310-dbm-3.10.13-150400.4.33.1
* python310-doc-3.10.13-150400.4.33.1
* python310-testsuite-debuginfo-3.10.13-150400.4.33.1
* python310-devel-3.10.13-150400.4.33.1
* python310-doc-devhelp-3.10.13-150400.4.33.1
* python310-tk-3.10.13-150400.4.33.1
* libpython3_10-1_0-debuginfo-3.10.13-150400.4.33.1
* python310-debuginfo-3.10.13-150400.4.33.1
* openSUSE Leap 15.4 (x86_64)
* python310-32bit-debuginfo-3.10.13-150400.4.33.1
* libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.33.1
* python310-base-32bit-debuginfo-3.10.13-150400.4.33.1
* python310-32bit-3.10.13-150400.4.33.1
* python310-base-32bit-3.10.13-150400.4.33.1
* libpython3_10-1_0-32bit-3.10.13-150400.4.33.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpython3_10-1_0-64bit-3.10.13-150400.4.33.1
* python310-64bit-debuginfo-3.10.13-150400.4.33.1
* python310-64bit-3.10.13-150400.4.33.1
* libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.33.1
* python310-base-64bit-3.10.13-150400.4.33.1
* python310-base-64bit-debuginfo-3.10.13-150400.4.33.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python310-debugsource-3.10.13-150400.4.33.1
* python310-3.10.13-150400.4.33.1
* python310-testsuite-3.10.13-150400.4.33.1
* python310-tools-3.10.13-150400.4.33.1
* python310-core-debugsource-3.10.13-150400.4.33.1
* python310-tk-debuginfo-3.10.13-150400.4.33.1
* python310-dbm-debuginfo-3.10.13-150400.4.33.1
* python310-idle-3.10.13-150400.4.33.1
* python310-curses-3.10.13-150400.4.33.1
* python310-base-3.10.13-150400.4.33.1
* libpython3_10-1_0-3.10.13-150400.4.33.1
* python310-curses-debuginfo-3.10.13-150400.4.33.1
* python310-base-debuginfo-3.10.13-150400.4.33.1
* python310-dbm-3.10.13-150400.4.33.1
* python310-doc-3.10.13-150400.4.33.1
* python310-testsuite-debuginfo-3.10.13-150400.4.33.1
* python310-devel-3.10.13-150400.4.33.1
* python310-doc-devhelp-3.10.13-150400.4.33.1
* python310-tk-3.10.13-150400.4.33.1
* libpython3_10-1_0-debuginfo-3.10.13-150400.4.33.1
* python310-debuginfo-3.10.13-150400.4.33.1
* openSUSE Leap 15.5 (x86_64)
* python310-32bit-debuginfo-3.10.13-150400.4.33.1
* libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.33.1
* python310-base-32bit-debuginfo-3.10.13-150400.4.33.1
* python310-32bit-3.10.13-150400.4.33.1
* python310-base-32bit-3.10.13-150400.4.33.1
* libpython3_10-1_0-32bit-3.10.13-150400.4.33.1
* Python 3 Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python310-core-debugsource-3.10.13-150400.4.33.1
* python310-debugsource-3.10.13-150400.4.33.1
* python310-devel-3.10.13-150400.4.33.1
* python310-tk-debuginfo-3.10.13-150400.4.33.1
* python310-tk-3.10.13-150400.4.33.1
* python310-base-debuginfo-3.10.13-150400.4.33.1
* python310-dbm-debuginfo-3.10.13-150400.4.33.1
* python310-idle-3.10.13-150400.4.33.1
* python310-dbm-3.10.13-150400.4.33.1
* python310-curses-3.10.13-150400.4.33.1
* libpython3_10-1_0-debuginfo-3.10.13-150400.4.33.1
* python310-3.10.13-150400.4.33.1
* python310-tools-3.10.13-150400.4.33.1
* python310-base-3.10.13-150400.4.33.1
* libpython3_10-1_0-3.10.13-150400.4.33.1
* python310-debuginfo-3.10.13-150400.4.33.1
* python310-curses-debuginfo-3.10.13-150400.4.33.1
## References:
* https://www.suse.com/security/cve/CVE-2023-40217.html
* https://bugzilla.suse.com/show_bug.cgi?id=1213463
* https://bugzilla.suse.com/show_bug.cgi?id=1214692
1
0
27 Sep '23
# Security update for binutils
Announcement ID: SUSE-SU-2023:3825-1
Rating: important
References:
* #1200962
* #1206080
* #1206556
* #1208037
* #1208038
* #1208040
* #1208409
* #1209642
* #1210297
* #1210733
* #1213458
* #1214565
* #1214567
* #1214579
* #1214580
* #1214604
* #1214611
* #1214619
* #1214620
* #1214623
* #1214624
* #1214625
* PED-5778
Cross-References:
* CVE-2020-19726
* CVE-2021-32256
* CVE-2022-35205
* CVE-2022-35206
* CVE-2022-4285
* CVE-2022-44840
* CVE-2022-45703
* CVE-2022-47673
* CVE-2022-47695
* CVE-2022-47696
* CVE-2022-48063
* CVE-2022-48064
* CVE-2022-48065
* CVE-2023-0687
* CVE-2023-1579
* CVE-2023-1972
* CVE-2023-2222
* CVE-2023-25585
* CVE-2023-25587
* CVE-2023-25588
CVSS scores:
* CVE-2020-19726 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-32256 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2021-32256 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-35205 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-35205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-35206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-4285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-4285 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-44840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-45703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-47673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48064 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-48064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-0687 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-0687 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-0687 ( NVD ): 4.6 CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-1579 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-1579 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-1972 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-1972 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-2222 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-25585 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-25585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-25587 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-25588 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-25588 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP4
* Basesystem Module 15-SP5
* Development Tools Module 15-SP4
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP4
* SUSE Package Hub 15 15-SP5
An update that solves 20 vulnerabilities, contains one feature and has two
security fixes can now be installed.
## Description:
This update for binutils fixes the following issues:
Update to version 2.41 [jsc#PED-5778]:
* The MIPS port now supports the Sony Interactive Entertainment Allegrex
processor, used with the PlayStation Portable, which implements the MIPS II
ISA along with a single-precision FPU and a few implementation-specific
integer instructions.
* Objdump's --private option can now be used on PE format files to display the
fields in the file header and section headers.
* New versioned release of libsframe: libsframe.so.1. This release introduces
versioned symbols with version node name LIBSFRAME_1.0. This release also
updates the ABI in an incompatible way: this includes removal of
sframe_get_funcdesc_with_addr API, change in the behavior of
sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs.
* SFrame Version 2 is now the default (and only) format version supported by
gas, ld, readelf and objdump.
* Add command-line option, --strip-section-headers, to objcopy and strip to
remove ELF section header from ELF file.
* The RISC-V port now supports the following new standard extensions:
* Zicond (conditional zero instructions)
* Zfa (additional floating-point instructions)
* Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng,
Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions)
* The RISC-V port now supports the following vendor-defined extensions:
* XVentanaCondOps
* Add support for Intel FRED, LKGS and AMX-COMPLEX instructions.
* A new .insn directive is recognized by x86 gas.
* Add SME2 support to the AArch64 port.
* The linker now accepts a command line option of --remap-inputs
<PATTERN>=<FILE> to relace any input file that matches <PATTERN> with
<FILE>. In addition the option --remap-inputs-file=<FILE> can be used to
specify a file containing any number of these remapping directives.
* The linker command line option --print-map-locals can be used to include
local symbols in a linker map. (ELF targets only).
* For most ELF based targets, if the --enable-linker-version option is used
then the version of the linker will be inserted as a string into the
.comment section.
* The linker script syntax has a new command for output sections: ASCIZ
"string" This will insert a zero-terminated string at the current location.
* Add command-line option, -z nosectionheader, to omit ELF section header.
* Contains fixes for these non-CVEs (not security bugs per upstreams
SECURITY.md):
* bsc#1209642 aka CVE-2023-1579 aka PR29988
* bsc#1210297 aka CVE-2023-1972 aka PR30285
* bsc#1210733 aka CVE-2023-2222 aka PR29936
* bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc)
* bsc#1214565 aka CVE-2020-19726 aka PR26240
* bsc#1214567 aka CVE-2022-35206 aka PR29290
* bsc#1214579 aka CVE-2022-35205 aka PR29289
* bsc#1214580 aka CVE-2022-44840 aka PR29732
* bsc#1214604 aka CVE-2022-45703 aka PR29799
* bsc#1214611 aka CVE-2022-48065 aka PR29925
* bsc#1214619 aka CVE-2022-48064 aka PR29922
* bsc#1214620 aka CVE-2022-48063 aka PR29924
* bsc#1214623 aka CVE-2022-47696 aka PR29677
* bsc#1214624 aka CVE-2022-47695 aka PR29846
* bsc#1214625 aka CVE-2022-47673 aka PR29876
* This only existed only for a very short while in SLE-15, as the main variant
in devel:gcc subsumed this in binutils-revert-rela.diff. Hence:
* Document fixed CVEs:
* bsc#1208037 aka CVE-2023-25588 aka PR29677
* bsc#1208038 aka CVE-2023-25587 aka PR29846
* bsc#1208040 aka CVE-2023-25585 aka PR29892
* bsc#1208409 aka CVE-2023-0687 aka PR29444
* Enable bpf-none cross target and add bpf-none to the multitarget set of
supported targets.
* Disable packed-relative-relocs for old codestreams. They generate buggy
relocations when binutils-revert-rela.diff is active. [bsc#1206556]
* Disable ZSTD debug section compress by default.
* Enable zstd compression algorithm (instead of zlib) for debug info sections
by default.
* Pack libgprofng only for supported platforms.
* Move libgprofng-related libraries to the proper locations (packages).
* Add --without=bootstrap for skipping of bootstrap (faster testing of the
package).
* Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515]
Update to version 2.40:
* Objdump has a new command line option --show-all-symbols which will make it
display all symbols that match a given address when disassembling. (Normally
only the first symbol that matches an address is shown).
* Add --enable-colored-disassembly configure time option to enable colored
disassembly output by default, if the output device is a terminal. Note,
this configure option is disabled by default.
* DCO signed contributions are now accepted.
* objcopy --decompress-debug-sections now supports zstd compressed debug
sections. The new option --compress-debug-sections=zstd compresses debug
sections with zstd.
* addr2line and objdump --dwarf now support zstd compressed debug sections.
* The dlltool program now accepts --deterministic-libraries and \--non-
deterministic-libraries as command line options to control whether or not it
generates deterministic output libraries. If neither of these options are
used the default is whatever was set when the binutils were configured.
* readelf and objdump now have a newly added option --sframe which dumps the
SFrame section.
* Add support for Intel RAO-INT instructions.
* Add support for Intel AVX-NE-CONVERT instructions.
* Add support for Intel MSRLIST instructions.
* Add support for Intel WRMSRNS instructions.
* Add support for Intel CMPccXADD instructions.
* Add support for Intel AVX-VNNI-INT8 instructions.
* Add support for Intel AVX-IFMA instructions.
* Add support for Intel PREFETCHI instructions.
* Add support for Intel AMX-FP16 instructions.
* gas now supports --compress-debug-sections=zstd to compress debug sections
with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that
selects the default compression algorithm for --enable-compressed-debug-
sections.
* Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs,
XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx,
XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA
manual, which are implemented in the Allwinner D1.
* Add support for the RISC-V Zawrs extension, version 1.0-rc4.
* Add support for Cortex-X1C for Arm.
* New command line option --gsframe to generate SFrame unwind information on
x86_64 and aarch64 targets.
* The linker has a new command line option to suppress the generation of any
warning or error messages. This can be useful when there is a need to create
a known non-working binary. The option is -w or --no-warnings.
* ld now supports zstd compressed debug sections. The new option \--compress-
debug-sections=zstd compresses debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that
selects the default compression algorithm for --enable-compressed-debug-
sections.
* Remove support for -z bndplt (MPX prefix instructions).
* Includes fixes for these CVEs:
* bsc#1206080 aka CVE-2022-4285 aka PR29699
* Enable by default: --enable-colored-disassembly.
* fix build on x86_64_vX platforms
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3825=1
* Basesystem Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3825=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3825=1
* Development Tools Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3825=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3825=1
* SUSE Package Hub 15 15-SP4
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3825=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3825=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3825=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3825=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3825=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3825=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3825=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3825=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3825=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3825=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3825=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3825=1
* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3825=1
* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-3825=1
* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3825=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2023-3825=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3825=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cross-hppa64-binutils-debugsource-2.41-150100.7.46.1
* cross-sparc-binutils-debuginfo-2.41-150100.7.46.1
* cross-hppa64-binutils-debuginfo-2.41-150100.7.46.1
* cross-hppa-binutils-debugsource-2.41-150100.7.46.1
* cross-sparc-binutils-2.41-150100.7.46.1
* binutils-gold-2.41-150100.7.46.1
* cross-ia64-binutils-2.41-150100.7.46.1
* cross-spu-binutils-debuginfo-2.41-150100.7.46.1
* cross-avr-binutils-2.41-150100.7.46.1
* cross-sparc64-binutils-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* cross-sparc64-binutils-debuginfo-2.41-150100.7.46.1
* cross-s390-binutils-debugsource-2.41-150100.7.46.1
* cross-xtensa-binutils-2.41-150100.7.46.1
* cross-ppc-binutils-2.41-150100.7.46.1
* cross-ppc-binutils-debugsource-2.41-150100.7.46.1
* cross-epiphany-binutils-2.41-150100.7.46.1
* cross-i386-binutils-debuginfo-2.41-150100.7.46.1
* cross-riscv64-binutils-2.41-150100.7.46.1
* cross-ppc64-binutils-debugsource-2.41-150100.7.46.1
* cross-sparc64-binutils-debugsource-2.41-150100.7.46.1
* cross-hppa64-binutils-2.41-150100.7.46.1
* cross-arm-binutils-debuginfo-2.41-150100.7.46.1
* cross-arm-binutils-debugsource-2.41-150100.7.46.1
* cross-m68k-binutils-debuginfo-2.41-150100.7.46.1
* cross-rx-binutils-2.41-150100.7.46.1
* libctf-nobfd0-2.41-150100.7.46.1
* cross-xtensa-binutils-debuginfo-2.41-150100.7.46.1
* cross-i386-binutils-debugsource-2.41-150100.7.46.1
* cross-spu-binutils-debugsource-2.41-150100.7.46.1
* cross-epiphany-binutils-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* cross-riscv64-binutils-debugsource-2.41-150100.7.46.1
* cross-ia64-binutils-debugsource-2.41-150100.7.46.1
* binutils-gold-debuginfo-2.41-150100.7.46.1
* cross-rx-binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* cross-m68k-binutils-2.41-150100.7.46.1
* cross-mips-binutils-debuginfo-2.41-150100.7.46.1
* cross-hppa-binutils-2.41-150100.7.46.1
* cross-ppc64-binutils-debuginfo-2.41-150100.7.46.1
* cross-i386-binutils-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* cross-ia64-binutils-debuginfo-2.41-150100.7.46.1
* cross-rx-binutils-debuginfo-2.41-150100.7.46.1
* cross-xtensa-binutils-debugsource-2.41-150100.7.46.1
* cross-hppa-binutils-debuginfo-2.41-150100.7.46.1
* cross-ppc64-binutils-2.41-150100.7.46.1
* cross-epiphany-binutils-debugsource-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* cross-sparc-binutils-debugsource-2.41-150100.7.46.1
* cross-avr-binutils-debugsource-2.41-150100.7.46.1
* cross-avr-binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* cross-m68k-binutils-debugsource-2.41-150100.7.46.1
* cross-spu-binutils-2.41-150100.7.46.1
* cross-arm-binutils-2.41-150100.7.46.1
* cross-ppc-binutils-debuginfo-2.41-150100.7.46.1
* cross-s390-binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* cross-s390-binutils-debuginfo-2.41-150100.7.46.1
* cross-mips-binutils-debugsource-2.41-150100.7.46.1
* cross-mips-binutils-2.41-150100.7.46.1
* cross-riscv64-binutils-debuginfo-2.41-150100.7.46.1
* openSUSE Leap 15.5 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* cross-aarch64-binutils-debugsource-2.41-150100.7.46.1
* cross-aarch64-binutils-debuginfo-2.41-150100.7.46.1
* cross-aarch64-binutils-2.41-150100.7.46.1
* openSUSE Leap 15.5 (aarch64 s390x x86_64)
* cross-ppc64le-binutils-debuginfo-2.41-150100.7.46.1
* cross-ppc64le-binutils-2.41-150100.7.46.1
* cross-ppc64le-binutils-debugsource-2.41-150100.7.46.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* cross-s390x-binutils-debugsource-2.41-150100.7.46.1
* cross-s390x-binutils-2.41-150100.7.46.1
* cross-s390x-binutils-debuginfo-2.41-150100.7.46.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x)
* cross-x86_64-binutils-debugsource-2.41-150100.7.46.1
* cross-x86_64-binutils-debuginfo-2.41-150100.7.46.1
* cross-x86_64-binutils-2.41-150100.7.46.1
* Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* Development Tools Module 15-SP4 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* Development Tools Module 15-SP5 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64)
* binutils-gold-2.41-150100.7.46.1
* binutils-gold-debuginfo-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* binutils-gold-2.41-150100.7.46.1
* binutils-gold-debuginfo-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE Manager Proxy 4.2 (x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Manager Retail Branch Server 4.2 (x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Manager Server 4.2 (ppc64le s390x x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* SUSE Enterprise Storage 7.1 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
* SUSE CaaS Platform 4.0 (x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* binutils-devel-32bit-2.41-150100.7.46.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libctf-nobfd0-2.41-150100.7.46.1
* binutils-debugsource-2.41-150100.7.46.1
* binutils-debuginfo-2.41-150100.7.46.1
* binutils-gold-2.41-150100.7.46.1
* libctf0-2.41-150100.7.46.1
* libctf-nobfd0-debuginfo-2.41-150100.7.46.1
* libctf0-debuginfo-2.41-150100.7.46.1
* binutils-2.41-150100.7.46.1
* binutils-devel-2.41-150100.7.46.1
* binutils-gold-debuginfo-2.41-150100.7.46.1
* openSUSE Leap 15.4 (x86_64)
* binutils-devel-32bit-2.41-150100.7.46.1
## References:
* https://www.suse.com/security/cve/CVE-2020-19726.html
* https://www.suse.com/security/cve/CVE-2021-32256.html
* https://www.suse.com/security/cve/CVE-2022-35205.html
* https://www.suse.com/security/cve/CVE-2022-35206.html
* https://www.suse.com/security/cve/CVE-2022-4285.html
* https://www.suse.com/security/cve/CVE-2022-44840.html
* https://www.suse.com/security/cve/CVE-2022-45703.html
* https://www.suse.com/security/cve/CVE-2022-47673.html
* https://www.suse.com/security/cve/CVE-2022-47695.html
* https://www.suse.com/security/cve/CVE-2022-47696.html
* https://www.suse.com/security/cve/CVE-2022-48063.html
* https://www.suse.com/security/cve/CVE-2022-48064.html
* https://www.suse.com/security/cve/CVE-2022-48065.html
* https://www.suse.com/security/cve/CVE-2023-0687.html
* https://www.suse.com/security/cve/CVE-2023-1579.html
* https://www.suse.com/security/cve/CVE-2023-1972.html
* https://www.suse.com/security/cve/CVE-2023-2222.html
* https://www.suse.com/security/cve/CVE-2023-25585.html
* https://www.suse.com/security/cve/CVE-2023-25587.html
* https://www.suse.com/security/cve/CVE-2023-25588.html
* https://bugzilla.suse.com/show_bug.cgi?id=1200962
* https://bugzilla.suse.com/show_bug.cgi?id=1206080
* https://bugzilla.suse.com/show_bug.cgi?id=1206556
* https://bugzilla.suse.com/show_bug.cgi?id=1208037
* https://bugzilla.suse.com/show_bug.cgi?id=1208038
* https://bugzilla.suse.com/show_bug.cgi?id=1208040
* https://bugzilla.suse.com/show_bug.cgi?id=1208409
* https://bugzilla.suse.com/show_bug.cgi?id=1209642
* https://bugzilla.suse.com/show_bug.cgi?id=1210297
* https://bugzilla.suse.com/show_bug.cgi?id=1210733
* https://bugzilla.suse.com/show_bug.cgi?id=1213458
* https://bugzilla.suse.com/show_bug.cgi?id=1214565
* https://bugzilla.suse.com/show_bug.cgi?id=1214567
* https://bugzilla.suse.com/show_bug.cgi?id=1214579
* https://bugzilla.suse.com/show_bug.cgi?id=1214580
* https://bugzilla.suse.com/show_bug.cgi?id=1214604
* https://bugzilla.suse.com/show_bug.cgi?id=1214611
* https://bugzilla.suse.com/show_bug.cgi?id=1214619
* https://bugzilla.suse.com/show_bug.cgi?id=1214620
* https://bugzilla.suse.com/show_bug.cgi?id=1214623
* https://bugzilla.suse.com/show_bug.cgi?id=1214624
* https://bugzilla.suse.com/show_bug.cgi?id=1214625
* https://jira.suse.com/browse/PED-5778
1
0