openSUSE Updates
Threads by month
- ----- 2024 -----
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
April 2024
- 3 participants
- 196 discussions
SUSE-RU-2024:1479-1: moderate: Recommended update for google-guest-agent, google-guest-configs, google-guest-oslogin, google-osconfig-agent
by OPENSUSE-UPDATES 30 Apr '24
by OPENSUSE-UPDATES 30 Apr '24
30 Apr '24
# Recommended update for google-guest-agent, google-guest-configs, google-guest-
oslogin, google-osconfig-agent
Announcement ID: SUSE-RU-2024:1479-1
Rating: moderate
References:
* bsc#1216546
* bsc#1218548
* bsc#1221146
* bsc#1221900
* bsc#1221901
* bsc#1222171
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has six fixes can now be installed.
## Description:
This update for google-guest-agent, google-guest-configs, google-guest-oslogin,
google-osconfig-agent contains the following fixes:
* Fix file permissions for google_authorized_principals binary (bsc#1222171)
* Update to version 20240314.00 (bsc#1221900, bsc#1221901)
* NetworkManager: only set secondary interfaces as up (#378)
* address manager: make sure we check for oldMetadata (#375)
* network: early setup network (#374)
* NetworkManager: fix ipv6 and ipv4 mode attribute (#373)
* Network Manager: make sure we clean up ifcfg files (#371)
* metadata script runner: fix script download (#370)
* oslogin: avoid adding extra empty line at the end of
/etc/security/group.conf (#369)
* Dynamic vlan (#361)
* Check for nil response (#366)
* Create NetworkManager implementation (#362)
* Skip interface manager on Windows (#363)
* network: remove ignore setup (#360)
* Create wicked network service implementation and its respective unit (#356)
* Update metadata script runner, add tests (#357)
* Refactor guest-agent to use common retry util (#355)
* Flush logs before exiting #358 (#359)
* Refresh ifcfg patches for new version
* No need for double %setup.
* Use %patch -P N instead of deprecated %patchN.
* Update to version 20240213.00
* Create systemd-networkd unit tests (#354)
* from version 20240209.00
* Update network manager unit tests (#351)
* from version 20240207.02
* Implement retry util (#350)
* from version 20240207.01
* Refactor utils package to not dump everything unrelated into one file (#352)
* from version 20240207.00
* Set version on metadata script runner (#353)
* Implement cleanup of deprecated configuration directives (#348)
* Ignore DHCP offered routes only for secondary nics (#347)
* Deprecate DHClient in favor of systemd-networkd (#342)
* Generate windows and linux licenses (#346)
* from version 20240122.00
* Remove quintonamore from OWNERS (#345)
* from version 20240111.00
* Delete integration tests (#343)
* from version 20240109.00
* Update licenses with dependencies of go-winio (#339)
* Add github.com/Microsoft/go-winio to third party licensing (#337)
* Refresh ifcfg patches for new version
* Update to version 20231214.00
* Fix snapshot test failure (#336)
* from version 20231212.00
* Implement json-based command messaging system for guest-agent (#326)
* from version 20231118.00
* sshca: Remove certificate caching (#334)
* from version 20231115.00
* revert: 3ddd9d4a496f7a9c591ded58c3f541fd9cc7e317 (#333)
* Update script runner to use common cfg package (#331)
* Update to version 20231110.00
* Update Google UEFI variable (#329)
* Update owners (#328)
* from version 20231103.00
* Make config parsing order consistent (#327)
* Update to version 20240307.00 (bsc#1221146, bsc#1221900, bsc#1221901)
* Support dot in NVMe device ids (#68)
* from version 20240304.00
* google_set_hostname: Extract rsyslog service name with a regexp for valid
systemd unit names (#67)
* from version 20240228.00
* Remove quintonamore from OWNERS (#64)
* from version 20240119.00
* Setup smp affinity for IRQs and XPS on A3+ VMs (#63)
* Update to version 20231214.00
* set multiqueue: A3 check set timeout the MDS call in 1s (#62)
* from version 20231103.00
* Update owners (#61)
* Update owners (#58)
* Update to version 20230929.00
* Update multinic filter to pick only pci devices (#59)
* Update to version 20240311.00 (bsc#1218548, bsc#1221900, bsc#1221901)
* pam: Bring back pam's account management implementation (#133)
* Change error messages when checking login policy (#129)
* Remove quintonamore from OWNERS (#128)
* Update to version 20231116.00
* build: Fix DESTDIR concatenation (#124)
* from version 20231113.00
* build: Fix clang build (#122)
* from version 20231103.00
* Update owners (#121)
* Update to version 20240320.00 (bsc#1221900, bsc#1221901)
* Enable OSConfig agent to read GPG keys files with multiple entities (#537)
* from version 20240314.00
* Update OWNERS file to replace mahmoudn GitHub username by personal email
GitHub username (#534)
* from version 20240313.01
* Bump google.golang.org/protobuf from 1.30.0 to 1.33.0 in /e2e_tests (#535)
* from version 20240313.00
* Adds a console and gcloud example policies (#533)
* from version 20240228.00
* GuestPolicies e2e: Remove ed package if exist for zypper startup_script in
recipe-steps tests (#532)
* from version 20240126.00
* Fix Enterprise Linux Recipe-Steps tests to install info dependency package
in the startup-script (#530)
* from version 20240125.01
* Fix SUSE pkg-update and pkg-no-update e2e tests (#529)
* from version 20240125.00
* Fix zypper patch info parser to consider conflicts-pkgs float versions
(#528)
* from version 20240123.01
* Fix SUSE package update e2e tests to use another existing package (#527)
* from version 20240123.00
* Update cis-exclude-check-once-a-day.yaml (#526)
* Update to version 20231219.00
* Bump golang.org/x/crypto from 0.14.0 to 0.17.0 (#524)
* from version 20231207.01
* Some change to create an agent release (#523)
* from version 20231207.00
* Some change to create an agent release (#522)
* from version 20231205.00
* Some change to create an agent release (#521)
* from version 20231130.02
* Merge pull request #519 from Gulio/just-release
* Merge branch 'master' into just-release
* Some change to create an agent release
* Some change to create an agent release
* from version 20231130.00
* Some change to create an agent release (#518)
* from version 20231129.00
* Fix parse yum updates to consider the packages under installing-dependencies
keyword (#502)
* Update feature names in the README file (#517)
* from version 20231128.00
* Updating owners (#508)
* from version 20231127.00
* Move OS policy CIS examples under the console folder (#514)
* from version 20231123.01
* Adds three more OS Policy examples to CIS folder (#509)
* Added ekrementeskii and MahmoudNada0 to OWNERS (#505)
* from version 20231123.00
* docs(osconfig):add OS policy examples for CIS scanning (#503)
* from version 20231121.02
* Added SCODE to Windows error description (#504)
* from version 20231121.01
* Update OWNERS (#501)
* Update go version to 1.21 (#507)
* from version 20231121.00
* Call fqdn (#481)
* from version 20231116.00
* Removing obsolete MS Windows 2019 images (#500)
* from version 20231107.00
* Update owners. (#498)
* from version 20231103.02
* Increasing test timeouts (#499)
* Update OWNERS (#497)
* from version 20231103.01
* Bump google.golang.org/grpc from 1.53.0 to 1.56.3 in /e2e_tests (#493)
* Bump google.golang.org/grpc from 1.53.0 to 1.56.3 (#494)
* from version 20231103.00
* Removing deprecated Win for containers OSs (#496)
* from version 20231027.00
* Shortening the reported image names (#495)
* from version 20231025.00
* Merge pull request #492 from GoogleCloudPlatform/michaljankowiak-patch-1
* Merge branch 'master' into michaljankowiak-patch-1
* Fixing name changes
* Fixing rename issue
* Fixed formatting
* Fixed formatting
* Fixing formatting
* Removing support for RHEL 6, adding RHEL 9
* Removing support for RHEL 6, adding for RHEL 9
* Removing support for RHEL 6 and adding for RHEL 9
* Removing step needed for RHEL 6
* Fixing build issues
* Removing nonexistent images and adding new ones
* from version 20231024.00
* Removing obsolete OS images and adding new ones (#491)
* from version 20231020.00
* Change debug messages when parsing zypper patch output (#490)
* from version 20231013.00
* Bump golang.org/x/net from 0.7.0 to 0.17.0 (#489)
* from version 20231010.00
* Revert "Added [main] section with gpgcheck to the agent-managed repo file
(#484)" (#488)
* from version 20231003.00
* Bump google.golang.org/grpc from 1.42.0 to 1.53.0 in /e2e_tests (#478)
* from version 20230920.00
* Update OWNERS (#485)
* from version 20230912.00
* Added [main] section with gpgcheck to the agent-managed repo file (#484)
* Migrate empty interface to any (#483)
* Bump the golang compiler version to 1.21 (bsc#1216546)
* Update to version 20230829.00
* Added burov, dowgird, paulinakania and Gulio to OWNERS (#482)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1479=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1479=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1479=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1479=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1479=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* google-guest-oslogin-debugsource-20240311.00-150000.1.43.1
* google-guest-agent-20240314.00-150000.1.46.2
* google-guest-oslogin-20240311.00-150000.1.43.1
* google-guest-oslogin-debuginfo-20240311.00-150000.1.43.1
* google-osconfig-agent-20240320.00-150000.1.33.5
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* google-guest-oslogin-debugsource-20240311.00-150000.1.43.1
* google-guest-agent-20240314.00-150000.1.46.2
* google-guest-oslogin-20240311.00-150000.1.43.1
* google-guest-oslogin-debuginfo-20240311.00-150000.1.43.1
* google-osconfig-agent-20240320.00-150000.1.33.5
* Public Cloud Module 15-SP2 (noarch)
* google-guest-configs-20240307.00-150000.1.31.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* google-guest-oslogin-debugsource-20240311.00-150000.1.43.1
* google-guest-agent-20240314.00-150000.1.46.2
* google-guest-oslogin-20240311.00-150000.1.43.1
* google-guest-oslogin-debuginfo-20240311.00-150000.1.43.1
* google-osconfig-agent-20240320.00-150000.1.33.5
* Public Cloud Module 15-SP3 (noarch)
* google-guest-configs-20240307.00-150000.1.31.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* google-guest-oslogin-debugsource-20240311.00-150000.1.43.1
* google-guest-agent-20240314.00-150000.1.46.2
* google-guest-oslogin-20240311.00-150000.1.43.1
* google-guest-oslogin-debuginfo-20240311.00-150000.1.43.1
* google-osconfig-agent-20240320.00-150000.1.33.5
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* google-guest-oslogin-debugsource-20240311.00-150000.1.43.1
* google-guest-agent-20240314.00-150000.1.46.2
* google-guest-oslogin-20240311.00-150000.1.43.1
* google-guest-oslogin-debuginfo-20240311.00-150000.1.43.1
* google-osconfig-agent-20240320.00-150000.1.33.5
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1216546
* https://bugzilla.suse.com/show_bug.cgi?id=1218548
* https://bugzilla.suse.com/show_bug.cgi?id=1221146
* https://bugzilla.suse.com/show_bug.cgi?id=1221900
* https://bugzilla.suse.com/show_bug.cgi?id=1221901
* https://bugzilla.suse.com/show_bug.cgi?id=1222171
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:1475-1
Rating: important
References:
* bsc#1222518
Cross-References:
* CVE-2024-31948
CVSS scores:
* CVE-2024-31948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2024-31948: Fixed denial of service due to malformed Prefix SID
attribute in BGP Update packet (bsc#1222518)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1475=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1475=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1475=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1475=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1475=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1475=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1475=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1475=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1475=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1475=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1475=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1475=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrr_pb0-debuginfo-7.4-150300.4.23.1
* frr-debugsource-7.4-150300.4.23.1
* libfrrzmq0-debuginfo-7.4-150300.4.23.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.23.1
* libfrrcares0-debuginfo-7.4-150300.4.23.1
* frr-devel-7.4-150300.4.23.1
* libfrrospfapiclient0-7.4-150300.4.23.1
* libmlag_pb0-7.4-150300.4.23.1
* libfrr0-debuginfo-7.4-150300.4.23.1
* libfrr0-7.4-150300.4.23.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.23.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.23.1
* frr-debuginfo-7.4-150300.4.23.1
* libfrrsnmp0-7.4-150300.4.23.1
* libmlag_pb0-debuginfo-7.4-150300.4.23.1
* libfrrfpm_pb0-7.4-150300.4.23.1
* libfrrgrpc_pb0-7.4-150300.4.23.1
* libfrr_pb0-7.4-150300.4.23.1
* libfrrcares0-7.4-150300.4.23.1
* libfrrzmq0-7.4-150300.4.23.1
* frr-7.4-150300.4.23.1
* libfrrsnmp0-debuginfo-7.4-150300.4.23.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31948.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222518
1
0
SUSE-RU-2024:1476-1: moderate: Recommended update for python-docutils
by OPENSUSE-UPDATES 30 Apr '24
by OPENSUSE-UPDATES 30 Apr '24
30 Apr '24
# Recommended update for python-docutils
Announcement ID: SUSE-RU-2024:1476-1
Rating: moderate
References:
* bsc#1219501
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that has one fix can now be installed.
## Description:
This update for python-docutils fixes the following issue:
* Use update-alternatives for all binary scripts and provide /usr/bin/docutils
to avoid conflict with python311-docutils (bsc#1219501)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1476=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1476=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1476=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1476=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1476=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1476=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1476=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1476=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1476=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1476=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1476=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1476=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1476=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1476=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1476=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1476=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1476=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1476=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1476=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1476=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1476=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1476=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1476=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1476=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1476=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1476=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1476=1
## Package List:
* openSUSE Leap Micro 5.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* openSUSE Leap Micro 5.4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* openSUSE Leap 15.5 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-docutils-0.14-150000.3.4.1
* Basesystem Module 15-SP5 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Package Hub 15 15-SP5 (noarch)
* python2-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Manager Proxy 4.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Manager Server 4.3 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Enterprise Storage 7.1 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* python3-docutils-0.14-150000.3.4.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* python3-docutils-0.14-150000.3.4.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1219501
1
0
30 Apr '24
# Recommended update for libzypp
Announcement ID: SUSE-RU-2024:1471-1
Rating: moderate
References:
* bsc#1223094
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for libzypp fixes the following issues:
* Don't try to refresh volatile media as long as raw metadata are present
(bsc#1223094)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1471=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1471=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1471=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1471=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1471=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1471=1 SUSE-SLE-Product-
SLES_SAP-15-SP4-2024-1471=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1471=1 SUSE-SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1471=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1471=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1471=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1471=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1471=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1471=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1471=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1471=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1471=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1471=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1471=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1471=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1471=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1471=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1471=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1471=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-doc-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-doc-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Manager Proxy 4.3 (x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libzypp-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libzypp-debugsource-17.32.5-150400.3.64.1
* libzypp-17.32.5-150400.3.64.1
* libzypp-devel-17.32.5-150400.3.64.1
* libzypp-debuginfo-17.32.5-150400.3.64.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223094
1
0
30 Apr '24
# Recommended update for cups-filters
Announcement ID: SUSE-RU-2024:1473-1
Rating: important
References:
* bsc#1173345
* bsc#1211401
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for cups-filters fixes the following issues:
* Fix printing only one copy of a postscript file instead of multiple
(bsc#1211401, bsc#1173345)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1473=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1473=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1473=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1473=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1473=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1473=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1473=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1473=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1473=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1473=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1473=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1473=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1473=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1473=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1473=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1473=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1473=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cups-filters-devel-1.25.0-150200.3.9.1
* cups-filters-debugsource-1.25.0-150200.3.9.1
* cups-filters-1.25.0-150200.3.9.1
* cups-filters-debuginfo-1.25.0-150200.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1173345
* https://bugzilla.suse.com/show_bug.cgi?id=1211401
1
0
29 Apr '24
# Security update for ffmpeg-4
Announcement ID: SUSE-SU-2024:1470-1
Rating: important
References:
* bsc#1223070
* bsc#1223235
* bsc#1223272
Cross-References:
* CVE-2023-49502
* CVE-2023-51793
* CVE-2024-31578
CVSS scores:
* CVE-2023-49502 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-51793 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-31578 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for ffmpeg-4 fixes the following issues:
* CVE-2024-31578: Fixed heap use-after-free via av_hwframe_ctx_init() when
vulkan_frames init failed (bsc#1223070)
* CVE-2023-49502: Fixed heap buffer overflow via the ff_bwdif_filter_intra_c
function in libavfilter/bwdifdsp.c (bsc#1223235)
* CVE-2023-51793: Fixed heap buffer overflow in the image_copy_plane function
in libavutil/imgutils.c (bsc#1223272)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1470=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1470=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1470=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1470=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1470=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1470=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1470=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1470=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1470=1
## Package List:
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libswscale5_9-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswscale5_9-debuginfo-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* ffmpeg-4-libavutil-devel-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavfilter-devel-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libswscale5_9-4.4-150400.3.24.1
* ffmpeg-4-libswresample-devel-4.4-150400.3.24.1
* ffmpeg-4-private-devel-4.4-150400.3.24.1
* ffmpeg-4-libavdevice-devel-4.4-150400.3.24.1
* ffmpeg-4-libavresample-devel-4.4-150400.3.24.1
* ffmpeg-4-libavcodec-devel-4.4-150400.3.24.1
* libavdevice58_13-4.4-150400.3.24.1
* libswscale5_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavformat-devel-4.4-150400.3.24.1
* ffmpeg-4-libswscale-devel-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libavfilter7_110-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-4.4-150400.3.24.1
* libavdevice58_13-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavresample4_0-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* libavresample4_0-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libavfilter7_110-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* ffmpeg-4-libpostproc-devel-4.4-150400.3.24.1
* openSUSE Leap 15.4 (x86_64)
* libavcodec58_134-32bit-4.4-150400.3.24.1
* libavdevice58_13-32bit-4.4-150400.3.24.1
* libavutil56_70-32bit-4.4-150400.3.24.1
* libswscale5_9-32bit-4.4-150400.3.24.1
* libswscale5_9-32bit-debuginfo-4.4-150400.3.24.1
* libavfilter7_110-32bit-debuginfo-4.4-150400.3.24.1
* libavformat58_76-32bit-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-32bit-4.4-150400.3.24.1
* libavfilter7_110-32bit-4.4-150400.3.24.1
* libavutil56_70-32bit-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-32bit-debuginfo-4.4-150400.3.24.1
* libavdevice58_13-32bit-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-32bit-debuginfo-4.4-150400.3.24.1
* libavformat58_76-32bit-4.4-150400.3.24.1
* libavresample4_0-32bit-debuginfo-4.4-150400.3.24.1
* libswresample3_9-32bit-debuginfo-4.4-150400.3.24.1
* libswresample3_9-32bit-4.4-150400.3.24.1
* libavresample4_0-32bit-4.4-150400.3.24.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavformat58_76-64bit-4.4-150400.3.24.1
* libavcodec58_134-64bit-4.4-150400.3.24.1
* libavdevice58_13-64bit-4.4-150400.3.24.1
* libavdevice58_13-64bit-debuginfo-4.4-150400.3.24.1
* libswscale5_9-64bit-debuginfo-4.4-150400.3.24.1
* libavformat58_76-64bit-debuginfo-4.4-150400.3.24.1
* libavfilter7_110-64bit-4.4-150400.3.24.1
* libavutil56_70-64bit-debuginfo-4.4-150400.3.24.1
* libswscale5_9-64bit-4.4-150400.3.24.1
* libswresample3_9-64bit-4.4-150400.3.24.1
* libavfilter7_110-64bit-debuginfo-4.4-150400.3.24.1
* libavresample4_0-64bit-4.4-150400.3.24.1
* libavutil56_70-64bit-4.4-150400.3.24.1
* libavcodec58_134-64bit-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-64bit-4.4-150400.3.24.1
* libpostproc55_9-64bit-debuginfo-4.4-150400.3.24.1
* libswresample3_9-64bit-debuginfo-4.4-150400.3.24.1
* libavresample4_0-64bit-debuginfo-4.4-150400.3.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ffmpeg-4-libavutil-devel-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavfilter-devel-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libswscale5_9-4.4-150400.3.24.1
* ffmpeg-4-libswresample-devel-4.4-150400.3.24.1
* ffmpeg-4-private-devel-4.4-150400.3.24.1
* ffmpeg-4-libavdevice-devel-4.4-150400.3.24.1
* ffmpeg-4-libavresample-devel-4.4-150400.3.24.1
* ffmpeg-4-libavcodec-devel-4.4-150400.3.24.1
* libavdevice58_13-4.4-150400.3.24.1
* libswscale5_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavformat-devel-4.4-150400.3.24.1
* ffmpeg-4-libswscale-devel-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libavfilter7_110-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* ffmpeg-4-4.4-150400.3.24.1
* libavdevice58_13-debuginfo-4.4-150400.3.24.1
* libavresample4_0-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* libavresample4_0-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libavfilter7_110-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* ffmpeg-4-libpostproc-devel-4.4-150400.3.24.1
* openSUSE Leap 15.5 (x86_64)
* libavcodec58_134-32bit-4.4-150400.3.24.1
* libavdevice58_13-32bit-4.4-150400.3.24.1
* libavutil56_70-32bit-4.4-150400.3.24.1
* libswscale5_9-32bit-4.4-150400.3.24.1
* libswscale5_9-32bit-debuginfo-4.4-150400.3.24.1
* libavfilter7_110-32bit-debuginfo-4.4-150400.3.24.1
* libavformat58_76-32bit-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-32bit-4.4-150400.3.24.1
* libavfilter7_110-32bit-4.4-150400.3.24.1
* libavutil56_70-32bit-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-32bit-debuginfo-4.4-150400.3.24.1
* libavdevice58_13-32bit-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-32bit-debuginfo-4.4-150400.3.24.1
* libavformat58_76-32bit-4.4-150400.3.24.1
* libavresample4_0-32bit-debuginfo-4.4-150400.3.24.1
* libswresample3_9-32bit-debuginfo-4.4-150400.3.24.1
* libswresample3_9-32bit-4.4-150400.3.24.1
* libavresample4_0-32bit-4.4-150400.3.24.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* ffmpeg-4-libavutil-devel-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavfilter-devel-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libswscale5_9-4.4-150400.3.24.1
* ffmpeg-4-libswresample-devel-4.4-150400.3.24.1
* ffmpeg-4-private-devel-4.4-150400.3.24.1
* ffmpeg-4-libavdevice-devel-4.4-150400.3.24.1
* ffmpeg-4-libavresample-devel-4.4-150400.3.24.1
* ffmpeg-4-libavcodec-devel-4.4-150400.3.24.1
* libavdevice58_13-4.4-150400.3.24.1
* libswscale5_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-libavformat-devel-4.4-150400.3.24.1
* ffmpeg-4-libswscale-devel-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libavfilter7_110-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* ffmpeg-4-4.4-150400.3.24.1
* libavdevice58_13-debuginfo-4.4-150400.3.24.1
* libavresample4_0-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* libavresample4_0-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libavfilter7_110-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* ffmpeg-4-libpostproc-devel-4.4-150400.3.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libswscale5_9-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswscale5_9-debuginfo-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* ffmpeg-4-debugsource-4.4-150400.3.24.1
* ffmpeg-4-debuginfo-4.4-150400.3.24.1
* libswresample3_9-4.4-150400.3.24.1
* libavutil56_70-4.4-150400.3.24.1
* libpostproc55_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-debuginfo-4.4-150400.3.24.1
* libpostproc55_9-4.4-150400.3.24.1
* libavcodec58_134-4.4-150400.3.24.1
* libswresample3_9-debuginfo-4.4-150400.3.24.1
* libavformat58_76-4.4-150400.3.24.1
* libavutil56_70-debuginfo-4.4-150400.3.24.1
* libavcodec58_134-debuginfo-4.4-150400.3.24.1
## References:
* https://www.suse.com/security/cve/CVE-2023-49502.html
* https://www.suse.com/security/cve/CVE-2023-51793.html
* https://www.suse.com/security/cve/CVE-2024-31578.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223070
* https://bugzilla.suse.com/show_bug.cgi?id=1223235
* https://bugzilla.suse.com/show_bug.cgi?id=1223272
1
0
29 Apr '24
# Recommended update for tracker
Announcement ID: SUSE-RU-2024:1467-1
Rating: moderate
References:
* bsc#1222949
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for tracker fixes the following issue:
* Initialize FTS tokenizer earlier to fix regressions with sqlite
(bsc#1222949)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1467=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1467=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1467=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1467=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1467=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1467=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1467=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1467=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1467=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1467=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1467=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1467=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1467=1
## Package List:
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* tracker-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch)
* tracker-lang-3.2.1-150400.3.6.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* openSUSE Leap 15.4 (noarch)
* tracker-lang-3.2.1-150400.3.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* openSUSE Leap 15.5 (noarch)
* tracker-lang-3.2.1-150400.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* tracker-lang-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* tracker-data-files-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-devel-3.2.1-150400.3.6.2
* typelib-1_0-Tracker-3_0-3.2.1-150400.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* tracker-debuginfo-3.2.1-150400.3.6.2
* tracker-debugsource-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-debuginfo-3.2.1-150400.3.6.2
* libtracker-sparql-3_0-0-3.2.1-150400.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222949
1
0
openSUSE-SU-2024:0114-1: important: Security update for pdns-recursor
by opensuse-security@opensuse.org 29 Apr '24
by opensuse-security@opensuse.org 29 Apr '24
29 Apr '24
openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0114-1
Rating: important
References: #1223262
Cross-References: CVE-2024-25583
CVSS scores:
CVE-2024-25583 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pdns-recursor fixes the following issues:
- update to 4.8.8:
* fixes a case when a crafted responses can lead to a denial of service
in Recursor if recursive forwarding is configured (boo#1223262,
CVE-2024-25583)
- changes in 4.8.7:
* If serving stale, wipe CNAME records from cache when we get a NODATA
negative response for them
* Fix the zoneToCache regression introduced by last security update
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-114=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64):
pdns-recursor-4.8.8-bp155.2.6.1
References:
https://www.suse.com/security/cve/CVE-2024-25583.html
https://bugzilla.suse.com/1223262
1
0
# Recommended update for vim
Announcement ID: SUSE-RU-2024:1458-1
Rating: moderate
References:
* bsc#1220763
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for vim fixes the following issues:
* Fix segmentation fault after updating to version 9.1.0111-150500.20.9.1
(bsc#1220763)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1458=1 SUSE-2024-1458=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1458=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1458=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1458=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* vim-9.1.0330-150500.20.12.1
* vim-small-debuginfo-9.1.0330-150500.20.12.1
* vim-debuginfo-9.1.0330-150500.20.12.1
* gvim-9.1.0330-150500.20.12.1
* vim-small-9.1.0330-150500.20.12.1
* vim-debugsource-9.1.0330-150500.20.12.1
* gvim-debuginfo-9.1.0330-150500.20.12.1
* openSUSE Leap 15.5 (noarch)
* vim-data-common-9.1.0330-150500.20.12.1
* vim-data-9.1.0330-150500.20.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* vim-data-common-9.1.0330-150500.20.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* vim-small-9.1.0330-150500.20.12.1
* vim-debugsource-9.1.0330-150500.20.12.1
* vim-debuginfo-9.1.0330-150500.20.12.1
* vim-small-debuginfo-9.1.0330-150500.20.12.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vim-9.1.0330-150500.20.12.1
* vim-small-debuginfo-9.1.0330-150500.20.12.1
* vim-debuginfo-9.1.0330-150500.20.12.1
* vim-small-9.1.0330-150500.20.12.1
* vim-debugsource-9.1.0330-150500.20.12.1
* Basesystem Module 15-SP5 (noarch)
* vim-data-common-9.1.0330-150500.20.12.1
* vim-data-9.1.0330-150500.20.12.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gvim-9.1.0330-150500.20.12.1
* vim-debugsource-9.1.0330-150500.20.12.1
* gvim-debuginfo-9.1.0330-150500.20.12.1
* vim-debuginfo-9.1.0330-150500.20.12.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220763
1
0
# Recommended update for vim
Announcement ID: SUSE-RU-2024:1459-1
Rating: moderate
References:
* bsc#1220763
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that has one fix can now be installed.
## Description:
This update for vim fixes the following issues:
* Fix segmentation fault after updating to version 9.1.0111-150500.20.9.1
(bsc#1220763)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1459=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1459=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1459=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1459=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1459=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1459=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1459=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1459=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1459=1
## Package List:
* openSUSE Leap Micro 5.3 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* openSUSE Leap Micro 5.4 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* vim-data-common-9.1.0330-150000.5.63.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0330-150000.5.63.1
* vim-small-debuginfo-9.1.0330-150000.5.63.1
* vim-small-9.1.0330-150000.5.63.1
* vim-debuginfo-9.1.0330-150000.5.63.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220763
1
0
SUSE-RU-2024:1460-1: moderate: Recommended update for csp-billing-adapter-local
by OPENSUSE-UPDATES 29 Apr '24
by OPENSUSE-UPDATES 29 Apr '24
29 Apr '24
# Recommended update for csp-billing-adapter-local
Announcement ID: SUSE-RU-2024:1460-1
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for csp-billing-adapter-local fixes the following issues:
* Update to version 0.5.1
* Cast file path to a string for usage
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1460=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1460=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1460=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python3-csp-billing-adapter-local-0.5.1-150400.9.14.1
* Public Cloud Module 15-SP4 (noarch)
* python3-csp-billing-adapter-local-0.5.1-150400.9.14.1
* Public Cloud Module 15-SP5 (noarch)
* python3-csp-billing-adapter-local-0.5.1-150400.9.14.1
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:1453-1
Rating: important
References:
* bsc#1220548
* bsc#1222518
Cross-References:
* CVE-2024-27913
* CVE-2024-31948
CVSS scores:
* CVE-2024-27913 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2024-27913: Fixed a denial of service issue via a malformed OSPF LSA
packet (bsc#1220548).
* CVE-2024-31948: Fixed denial of service due to malformed Prefix SID
attribute in BGP Update packet (bsc#1222518).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1453=1 openSUSE-SLE-15.5-2024-1453=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1453=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.20.1
* libfrr0-8.4-150500.4.20.1
* frr-8.4-150500.4.20.1
* libfrrzmq0-debuginfo-8.4-150500.4.20.1
* libfrrsnmp0-debuginfo-8.4-150500.4.20.1
* libmlag_pb0-8.4-150500.4.20.1
* libmlag_pb0-debuginfo-8.4-150500.4.20.1
* libfrr_pb0-debuginfo-8.4-150500.4.20.1
* libfrrfpm_pb0-8.4-150500.4.20.1
* libfrrzmq0-8.4-150500.4.20.1
* libfrr0-debuginfo-8.4-150500.4.20.1
* frr-debugsource-8.4-150500.4.20.1
* libfrrcares0-debuginfo-8.4-150500.4.20.1
* frr-devel-8.4-150500.4.20.1
* libfrrospfapiclient0-8.4-150500.4.20.1
* libfrrcares0-8.4-150500.4.20.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.20.1
* libfrr_pb0-8.4-150500.4.20.1
* libfrrsnmp0-8.4-150500.4.20.1
* frr-debuginfo-8.4-150500.4.20.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.20.1
* libfrr0-8.4-150500.4.20.1
* frr-8.4-150500.4.20.1
* libfrrzmq0-debuginfo-8.4-150500.4.20.1
* libfrrsnmp0-debuginfo-8.4-150500.4.20.1
* libmlag_pb0-8.4-150500.4.20.1
* libmlag_pb0-debuginfo-8.4-150500.4.20.1
* libfrr_pb0-debuginfo-8.4-150500.4.20.1
* libfrrfpm_pb0-8.4-150500.4.20.1
* libfrrzmq0-8.4-150500.4.20.1
* libfrr0-debuginfo-8.4-150500.4.20.1
* frr-debugsource-8.4-150500.4.20.1
* libfrrcares0-debuginfo-8.4-150500.4.20.1
* frr-devel-8.4-150500.4.20.1
* libfrrospfapiclient0-8.4-150500.4.20.1
* libfrrcares0-8.4-150500.4.20.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.20.1
* libfrr_pb0-8.4-150500.4.20.1
* libfrrsnmp0-8.4-150500.4.20.1
* frr-debuginfo-8.4-150500.4.20.1
## References:
* https://www.suse.com/security/cve/CVE-2024-27913.html
* https://www.suse.com/security/cve/CVE-2024-31948.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220548
* https://bugzilla.suse.com/show_bug.cgi?id=1222518
1
0
26 Apr '24
# Security update for openCryptoki
Announcement ID: SUSE-SU-2024:1447-1
Rating: moderate
References:
* bsc#1219217
* jsc#PED-3360
* jsc#PED-3361
Cross-References:
* CVE-2024-0914
CVSS scores:
* CVE-2024-0914 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-0914 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and contains two features can now be
installed.
## Description:
This update for openCryptoki fixes the following issues:
Upgrade openCryptoki to version 3.23 (jsc#PED-3360, jsc#PED-3361)
* EP11: Add support for FIPS-session mode
* CVE-2024-0914: Updates to harden against RSA timing attacks (bsc#1219217)
* Bug fixes
* provide user(pkcs11) and group(pkcs11)
Upgrade to version 3.22 (jsc#PED-3361)
* CCA: Add support for the AES-XTS key type using CPACF protected keys
* p11sak: Add support for managing certificate objects
* p11sak: Add support for public sessions (no-login option)
* p11sak: Add support for logging in as SO (security Officer)
* p11sak: Add support for importing/exporting Edwards and Montgomery keys
* p11sak: Add support for importing of RSA-PSS keys and certificates
* CCA/EP11/Soft/ICA: Ensure that the 2 key parts of an AES-XTS key are
different
Update to version 3.21 (jsc#PED-3360, jsc#PED-3361)
* EP11 and CCA: Support concurrent HSM master key changes
* CCA: protected-key option
* pkcsslotd: no longer run as root user and further hardening
* p11sak: Add support for additional key types (DH, DSA, generic secret)
* p11sak: Allow wildcards in label filter
* p11sak: Allow to specify hex value for CKA_ID attribute
* p11sak: Support sorting when listing keys
* p11sak: New commands: set-key-attr, copy-key to modify and copy keys
* p11sak: New commands: import-key, export-key to import and export keys
* Remove support for --disable-locks (transactional memory)
* Updates to harden against RSA timing attacks
* Bug fixes
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1447=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1447=1 openSUSE-SLE-15.5-2024-1447=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1447=1
## Package List:
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openCryptoki-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-debugsource-3.23.0-150500.3.3.13
* openCryptoki-3.23.0-150500.3.3.13
* Server Applications Module 15-SP5 (ppc64le s390x)
* openCryptoki-64bit-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-64bit-3.23.0-150500.3.3.13
* Server Applications Module 15-SP5 (ppc64le s390x x86_64)
* openCryptoki-devel-3.23.0-150500.3.3.13
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openCryptoki-devel-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-devel-3.23.0-150500.3.3.13
* openCryptoki-debugsource-3.23.0-150500.3.3.13
* openCryptoki-3.23.0-150500.3.3.13
* openCryptoki-debuginfo-3.23.0-150500.3.3.13
* openSUSE Leap 15.5 (i586)
* openCryptoki-32bit-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-32bit-3.23.0-150500.3.3.13
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* openCryptoki-64bit-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-64bit-3.23.0-150500.3.3.13
* SUSE Linux Enterprise Micro 5.5 (s390x)
* openCryptoki-debuginfo-3.23.0-150500.3.3.13
* openCryptoki-debugsource-3.23.0-150500.3.3.13
* openCryptoki-3.23.0-150500.3.3.13
## References:
* https://www.suse.com/security/cve/CVE-2024-0914.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219217
* https://jira.suse.com/browse/PED-3360
* https://jira.suse.com/browse/PED-3361
1
0
26 Apr '24
# Feature update for python-M2Crypto
Announcement ID: SUSE-FU-2024:1448-1
Rating: low
References:
* bsc#1205042
* bsc#1212757
* bsc#1217782
* jsc#PED-68
Cross-References:
* CVE-2020-25657
CVSS scores:
* CVE-2020-25657 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2020-25657 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability, contains one feature and has two fixes
can now be installed.
## Description:
This update for python-M2Crypto fixes the following issue:
* Build for modern python stack
* Adds python311-M2Crypto
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1448=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1448=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1448=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1448=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1448=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1448=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1448=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1448=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* openSUSE Leap 15.4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* openSUSE Leap 15.5 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* Python 3 Module 15-SP5 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python311-M2Crypto-debuginfo-0.40.0-150400.3.9.1
* python-M2Crypto-debugsource-0.40.0-150400.3.9.1
* python311-M2Crypto-0.40.0-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python-M2Crypto-doc-0.40.0-150400.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2020-25657.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205042
* https://bugzilla.suse.com/show_bug.cgi?id=1212757
* https://bugzilla.suse.com/show_bug.cgi?id=1217782
* https://jira.suse.com/browse/PED-68
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:1438-1
Rating: important
References:
* bsc#1213269
* bsc#1218889
* bsc#1222843
* bsc#1222845
Cross-References:
* CVE-2023-3019
* CVE-2023-6683
* CVE-2024-3446
* CVE-2024-3447
CVSS scores:
* CVE-2023-3019 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-3019 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-6683 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6683 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3446 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-3447 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport()
(bsc#1222845)
* CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request()
(bsc#1218889)
* CVE-2024-3446: Fixed DMA reentrancy issue leads to double free vulnerability
(bsc#1222843)
* CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest()
(bsc#1213269)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1438=1 openSUSE-SLE-15.5-2024-1438=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1438=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1438=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1438=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1438=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qemu-hw-display-qxl-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.15.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-jack-7.1.0-150500.49.15.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.15.1
* qemu-chardev-spice-7.1.0-150500.49.15.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.15.1
* qemu-block-iscsi-7.1.0-150500.49.15.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.15.1
* qemu-7.1.0-150500.49.15.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.15.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-ppc-debuginfo-7.1.0-150500.49.15.1
* qemu-tools-7.1.0-150500.49.15.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.15.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.15.1
* qemu-s390x-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.15.1
* qemu-arm-7.1.0-150500.49.15.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.15.1
* qemu-lang-7.1.0-150500.49.15.1
* qemu-ppc-7.1.0-150500.49.15.1
* qemu-accel-qtest-7.1.0-150500.49.15.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.15.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.15.1
* qemu-block-nfs-7.1.0-150500.49.15.1
* qemu-extra-debuginfo-7.1.0-150500.49.15.1
* qemu-x86-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-7.1.0-150500.49.15.1
* qemu-audio-alsa-7.1.0-150500.49.15.1
* qemu-audio-oss-7.1.0-150500.49.15.1
* qemu-headless-7.1.0-150500.49.15.1
* qemu-guest-agent-7.1.0-150500.49.15.1
* qemu-debugsource-7.1.0-150500.49.15.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-opengl-7.1.0-150500.49.15.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-pa-7.1.0-150500.49.15.1
* qemu-block-ssh-7.1.0-150500.49.15.1
* qemu-linux-user-debuginfo-7.1.0-150500.49.15.1
* qemu-block-gluster-7.1.0-150500.49.15.1
* qemu-ksm-7.1.0-150500.49.15.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-curses-7.1.0-150500.49.15.1
* qemu-extra-7.1.0-150500.49.15.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.15.1
* qemu-linux-user-7.1.0-150500.49.15.1
* qemu-tools-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-dbus-7.1.0-150500.49.15.1
* qemu-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.15.1
* qemu-chardev-baum-7.1.0-150500.49.15.1
* qemu-ui-gtk-7.1.0-150500.49.15.1
* qemu-arm-debuginfo-7.1.0-150500.49.15.1
* qemu-block-curl-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.15.1
* qemu-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-core-7.1.0-150500.49.15.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.15.1
* qemu-block-dmg-7.1.0-150500.49.15.1
* qemu-linux-user-debugsource-7.1.0-150500.49.15.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-spice-7.1.0-150500.49.15.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-usb-host-7.1.0-150500.49.15.1
* qemu-ivshmem-tools-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-7.1.0-150500.49.15.1
* qemu-vhost-user-gpu-7.1.0-150500.49.15.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-dbus-7.1.0-150500.49.15.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.15.1
* qemu-s390x-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-app-7.1.0-150500.49.15.1
* openSUSE Leap 15.5 (s390x x86_64 i586)
* qemu-kvm-7.1.0-150500.49.15.1
* openSUSE Leap 15.5 (noarch)
* qemu-seabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-skiboot-7.1.0-150500.49.15.1
* qemu-SLOF-7.1.0-150500.49.15.1
* qemu-microvm-7.1.0-150500.49.15.1
* qemu-sgabios-8-150500.49.15.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-ipxe-1.0.0+-150500.49.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-debuginfo-7.1.0-150500.49.15.1
* qemu-block-rbd-7.1.0-150500.49.15.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* qemu-debugsource-7.1.0-150500.49.15.1
* qemu-ui-opengl-7.1.0-150500.49.15.1
* qemu-tools-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.15.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.15.1
* qemu-tools-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.15.1
* qemu-chardev-spice-7.1.0-150500.49.15.1
* qemu-block-curl-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-7.1.0-150500.49.15.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.15.1
* qemu-debuginfo-7.1.0-150500.49.15.1
* qemu-7.1.0-150500.49.15.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-core-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1
* qemu-audio-spice-7.1.0-150500.49.15.1
* qemu-guest-agent-7.1.0-150500.49.15.1
* SUSE Linux Enterprise Micro 5.5 (aarch64)
* qemu-arm-7.1.0-150500.49.15.1
* qemu-arm-debuginfo-7.1.0-150500.49.15.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-ipxe-1.0.0+-150500.49.15.1
* qemu-sgabios-8-150500.49.15.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* qemu-s390x-7.1.0-150500.49.15.1
* qemu-s390x-debuginfo-7.1.0-150500.49.15.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* qemu-x86-7.1.0-150500.49.15.1
* qemu-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-7.1.0-150500.49.15.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debugsource-7.1.0-150500.49.15.1
* qemu-tools-debuginfo-7.1.0-150500.49.15.1
* qemu-tools-7.1.0-150500.49.15.1
* qemu-debuginfo-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (noarch)
* qemu-seabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-skiboot-7.1.0-150500.49.15.1
* qemu-SLOF-7.1.0-150500.49.15.1
* qemu-microvm-7.1.0-150500.49.15.1
* qemu-sgabios-8-150500.49.15.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debugsource-7.1.0-150500.49.15.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.15.1
* qemu-block-dmg-7.1.0-150500.49.15.1
* qemu-block-gluster-7.1.0-150500.49.15.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.15.1
* qemu-extra-7.1.0-150500.49.15.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-jack-7.1.0-150500.49.15.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.15.1
* qemu-ivshmem-tools-7.1.0-150500.49.15.1
* qemu-vhost-user-gpu-7.1.0-150500.49.15.1
* qemu-accel-qtest-7.1.0-150500.49.15.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.15.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-block-nfs-7.1.0-150500.49.15.1
* qemu-extra-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.15.1
* qemu-debuginfo-7.1.0-150500.49.15.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-oss-7.1.0-150500.49.15.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-alsa-7.1.0-150500.49.15.1
* qemu-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-pa-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-7.1.0-150500.49.15.1
* qemu-x86-7.1.0-150500.49.15.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le)
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64)
* qemu-s390x-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.15.1
* qemu-s390x-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* qemu-ppc-7.1.0-150500.49.15.1
* qemu-ppc-debuginfo-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x x86_64)
* qemu-arm-7.1.0-150500.49.15.1
* qemu-arm-debuginfo-7.1.0-150500.49.15.1
* SUSE Package Hub 15 15-SP5 (s390x)
* qemu-audio-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-opengl-7.1.0-150500.49.15.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-app-7.1.0-150500.49.15.1
* qemu-chardev-spice-7.1.0-150500.49.15.1
* qemu-ui-spice-core-7.1.0-150500.49.15.1
* qemu-ui-gtk-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-7.1.0-150500.49.15.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-spice-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debugsource-7.1.0-150500.49.15.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.15.1
* qemu-block-ssh-7.1.0-150500.49.15.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.15.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.15.1
* qemu-ksm-7.1.0-150500.49.15.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-curses-7.1.0-150500.49.15.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-dbus-7.1.0-150500.49.15.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.15.1
* qemu-block-rbd-7.1.0-150500.49.15.1
* qemu-hw-usb-host-7.1.0-150500.49.15.1
* qemu-chardev-baum-7.1.0-150500.49.15.1
* qemu-block-curl-7.1.0-150500.49.15.1
* qemu-lang-7.1.0-150500.49.15.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-dbus-7.1.0-150500.49.15.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.15.1
* qemu-block-iscsi-7.1.0-150500.49.15.1
* qemu-debuginfo-7.1.0-150500.49.15.1
* qemu-7.1.0-150500.49.15.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.15.1
* qemu-guest-agent-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (aarch64)
* qemu-arm-7.1.0-150500.49.15.1
* qemu-arm-debuginfo-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (aarch64 ppc64le x86_64)
* qemu-audio-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-opengl-7.1.0-150500.49.15.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.15.1
* qemu-ui-spice-app-7.1.0-150500.49.15.1
* qemu-chardev-spice-7.1.0-150500.49.15.1
* qemu-ui-spice-core-7.1.0-150500.49.15.1
* qemu-ui-gtk-7.1.0-150500.49.15.1
* qemu-hw-usb-redirect-7.1.0-150500.49.15.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-spice-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (noarch)
* qemu-seabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-skiboot-7.1.0-150500.49.15.1
* qemu-SLOF-7.1.0-150500.49.15.1
* qemu-sgabios-8-150500.49.15.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1
* qemu-ipxe-1.0.0+-150500.49.15.1
* Server Applications Module 15-SP5 (ppc64le)
* qemu-ppc-7.1.0-150500.49.15.1
* qemu-ppc-debuginfo-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (s390x x86_64)
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.15.1
* qemu-kvm-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (s390x)
* qemu-s390x-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.15.1
* qemu-s390x-debuginfo-7.1.0-150500.49.15.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.15.1
* Server Applications Module 15-SP5 (x86_64)
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-alsa-7.1.0-150500.49.15.1
* qemu-x86-debuginfo-7.1.0-150500.49.15.1
* qemu-audio-pa-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-7.1.0-150500.49.15.1
* qemu-x86-7.1.0-150500.49.15.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.15.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.15.1
## References:
* https://www.suse.com/security/cve/CVE-2023-3019.html
* https://www.suse.com/security/cve/CVE-2023-6683.html
* https://www.suse.com/security/cve/CVE-2024-3446.html
* https://www.suse.com/security/cve/CVE-2024-3447.html
* https://bugzilla.suse.com/show_bug.cgi?id=1213269
* https://bugzilla.suse.com/show_bug.cgi?id=1218889
* https://bugzilla.suse.com/show_bug.cgi?id=1222843
* https://bugzilla.suse.com/show_bug.cgi?id=1222845
1
0
26 Apr '24
# Security update for python-idna
Announcement ID: SUSE-SU-2024:1439-1
Rating: moderate
References:
* bsc#1222842
Cross-References:
* CVE-2024-3651
CVSS scores:
* CVE-2024-3651 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for python-idna fixes the following issues:
* CVE-2024-3651: Fixed potential DoS via resource consumption via specially
crafted inputs to idna.encode() (bsc#1222842).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1439=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1439=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1439=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1439=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1439=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1439=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1439=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1439=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1439=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1439=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1439=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1439=1
## Package List:
* openSUSE Leap Micro 5.3 (noarch)
* python3-idna-2.6-150000.3.3.1
* openSUSE Leap Micro 5.4 (noarch)
* python3-idna-2.6-150000.3.3.1
* openSUSE Leap 15.5 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-idna-2.6-150000.3.3.1
* Basesystem Module 15-SP5 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* python3-idna-2.6-150000.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* python3-idna-2.6-150000.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3651.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222842
1
0
26 Apr '24
# Security update for python-gunicorn
Announcement ID: SUSE-SU-2024:1440-1
Rating: important
References:
* bsc#1222950
Cross-References:
* CVE-2024-1135
CVSS scores:
* CVE-2024-1135 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for python-gunicorn fixes the following issues:
* CVE-2024-1135: Fixed HTTP Request Smuggling (bsc#1222950)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1440=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1440=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1440=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1440=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1440=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1440=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1440=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1440=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* openSUSE Leap 15.4 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* openSUSE Leap 15.5 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
* Python 3 Module 15-SP5 (noarch)
* python311-gunicorn-20.1.0-150400.12.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1135.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222950
1
0
26 Apr '24
# Recommended update for liblouis
Announcement ID: SUSE-RU-2024:1441-1
Rating: moderate
References:
* bsc#1198348
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for liblouis fixes the following issues:
* Add s390x-support patch to fix issues with python bindings on big endian
machines (gh#liblouis/liblouis#1552, bsc#1198348)
* Run python tests in %check
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1441=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1441=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1441=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1441=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1441=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1441=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1441=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1441=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* liblouis-tools-debuginfo-3.20.0-150400.3.16.3
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis-doc-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* liblouis-tools-3.20.0-150400.3.16.3
* openSUSE Leap 15.5 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* liblouis-tools-debuginfo-3.20.0-150400.3.16.3
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis-doc-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* liblouis-tools-3.20.0-150400.3.16.3
* Desktop Applications Module 15-SP5 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* liblouis-data-3.20.0-150400.3.16.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-louis-3.20.0-150400.3.16.3
* liblouis20-3.20.0-150400.3.16.3
* liblouis-devel-3.20.0-150400.3.16.3
* liblouis-debuginfo-3.20.0-150400.3.16.3
* liblouis20-debuginfo-3.20.0-150400.3.16.3
* liblouis-debugsource-3.20.0-150400.3.16.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1198348
1
0
# Security update for php7
Announcement ID: SUSE-SU-2024:1444-1
Rating: moderate
References:
* bsc#1222857
* bsc#1222858
Cross-References:
* CVE-2024-2756
* CVE-2024-3096
CVSS scores:
* CVE-2024-2756 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-3096 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for php7 fixes the following issues:
* CVE-2024-2756: Fixed bypass of security fix applied for CVE-2022-31629 that
lead PHP to consider not secure cookies as secure (bsc#1222857)
* CVE-2024-3096: Fixed bypass on null byte leading passwords checked via
password_verify (bsc#1222858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1444=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1444=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-1444=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1444=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* apache2-mod_php7-debugsource-7.4.33-150400.4.34.1
* php7-gmp-7.4.33-150400.4.34.1
* php7-gettext-7.4.33-150400.4.34.1
* php7-sodium-7.4.33-150400.4.34.1
* php7-embed-debugsource-7.4.33-150400.4.34.1
* php7-posix-debuginfo-7.4.33-150400.4.34.1
* php7-soap-7.4.33-150400.4.34.1
* php7-zip-debuginfo-7.4.33-150400.4.34.1
* php7-xmlreader-7.4.33-150400.4.34.1
* php7-tidy-debuginfo-7.4.33-150400.4.34.1
* php7-dba-debuginfo-7.4.33-150400.4.34.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.34.1
* php7-intl-debuginfo-7.4.33-150400.4.34.1
* php7-cli-debuginfo-7.4.33-150400.4.34.1
* php7-shmop-7.4.33-150400.4.34.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-7.4.33-150400.4.34.1
* php7-7.4.33-150400.4.34.1
* php7-xsl-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-debuginfo-7.4.33-150400.4.34.1
* php7-fastcgi-7.4.33-150400.4.34.1
* php7-curl-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-7.4.33-150400.4.34.1
* php7-calendar-7.4.33-150400.4.34.1
* php7-calendar-debuginfo-7.4.33-150400.4.34.1
* php7-exif-7.4.33-150400.4.34.1
* php7-fileinfo-7.4.33-150400.4.34.1
* php7-mbstring-7.4.33-150400.4.34.1
* php7-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-7.4.33-150400.4.34.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.34.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.34.1
* php7-gettext-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-debuginfo-7.4.33-150400.4.34.1
* php7-soap-debuginfo-7.4.33-150400.4.34.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.34.1
* php7-readline-debuginfo-7.4.33-150400.4.34.1
* php7-dom-7.4.33-150400.4.34.1
* php7-gd-7.4.33-150400.4.34.1
* php7-ctype-7.4.33-150400.4.34.1
* php7-sqlite-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-7.4.33-150400.4.34.1
* php7-fastcgi-debugsource-7.4.33-150400.4.34.1
* php7-shmop-debuginfo-7.4.33-150400.4.34.1
* php7-phar-debuginfo-7.4.33-150400.4.34.1
* php7-pgsql-7.4.33-150400.4.34.1
* php7-odbc-7.4.33-150400.4.34.1
* php7-zip-7.4.33-150400.4.34.1
* php7-gmp-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-debuginfo-7.4.33-150400.4.34.1
* php7-dba-7.4.33-150400.4.34.1
* php7-exif-debuginfo-7.4.33-150400.4.34.1
* php7-sysvsem-7.4.33-150400.4.34.1
* php7-snmp-debuginfo-7.4.33-150400.4.34.1
* php7-cli-7.4.33-150400.4.34.1
* php7-odbc-debuginfo-7.4.33-150400.4.34.1
* php7-pdo-debuginfo-7.4.33-150400.4.34.1
* php7-devel-7.4.33-150400.4.34.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.34.1
* php7-bcmath-7.4.33-150400.4.34.1
* php7-pcntl-7.4.33-150400.4.34.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.34.1
* php7-snmp-7.4.33-150400.4.34.1
* php7-bcmath-debuginfo-7.4.33-150400.4.34.1
* php7-intl-7.4.33-150400.4.34.1
* php7-embed-debuginfo-7.4.33-150400.4.34.1
* php7-sysvshm-7.4.33-150400.4.34.1
* php7-dom-debuginfo-7.4.33-150400.4.34.1
* php7-mysql-7.4.33-150400.4.34.1
* php7-sockets-7.4.33-150400.4.34.1
* php7-ctype-debuginfo-7.4.33-150400.4.34.1
* php7-pcntl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debugsource-7.4.33-150400.4.34.1
* php7-pgsql-debuginfo-7.4.33-150400.4.34.1
* php7-sodium-debuginfo-7.4.33-150400.4.34.1
* php7-embed-7.4.33-150400.4.34.1
* php7-curl-7.4.33-150400.4.34.1
* php7-sockets-debuginfo-7.4.33-150400.4.34.1
* php7-posix-7.4.33-150400.4.34.1
* php7-ldap-7.4.33-150400.4.34.1
* php7-enchant-7.4.33-150400.4.34.1
* php7-mysql-debuginfo-7.4.33-150400.4.34.1
* php7-tokenizer-7.4.33-150400.4.34.1
* php7-enchant-debuginfo-7.4.33-150400.4.34.1
* php7-json-debuginfo-7.4.33-150400.4.34.1
* php7-phar-7.4.33-150400.4.34.1
* php7-xmlrpc-7.4.33-150400.4.34.1
* php7-openssl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debuginfo-7.4.33-150400.4.34.1
* apache2-mod_php7-7.4.33-150400.4.34.1
* php7-ldap-debuginfo-7.4.33-150400.4.34.1
* php7-sqlite-7.4.33-150400.4.34.1
* php7-debugsource-7.4.33-150400.4.34.1
* php7-sysvmsg-7.4.33-150400.4.34.1
* php7-tidy-7.4.33-150400.4.34.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.34.1
* php7-xmlwriter-7.4.33-150400.4.34.1
* php7-gd-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-7.4.33-150400.4.34.1
* php7-openssl-7.4.33-150400.4.34.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.34.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.34.1
* php7-test-7.4.33-150400.4.34.1
* php7-pdo-7.4.33-150400.4.34.1
* php7-readline-7.4.33-150400.4.34.1
* php7-json-7.4.33-150400.4.34.1
* php7-mbstring-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-7.4.33-150400.4.34.1
* php7-xsl-7.4.33-150400.4.34.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* apache2-mod_php7-debugsource-7.4.33-150400.4.34.1
* php7-gmp-7.4.33-150400.4.34.1
* php7-gettext-7.4.33-150400.4.34.1
* php7-sodium-7.4.33-150400.4.34.1
* php7-embed-debugsource-7.4.33-150400.4.34.1
* php7-posix-debuginfo-7.4.33-150400.4.34.1
* php7-soap-7.4.33-150400.4.34.1
* php7-zip-debuginfo-7.4.33-150400.4.34.1
* php7-xmlreader-7.4.33-150400.4.34.1
* php7-tidy-debuginfo-7.4.33-150400.4.34.1
* php7-dba-debuginfo-7.4.33-150400.4.34.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.34.1
* php7-intl-debuginfo-7.4.33-150400.4.34.1
* php7-cli-debuginfo-7.4.33-150400.4.34.1
* php7-shmop-7.4.33-150400.4.34.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-7.4.33-150400.4.34.1
* php7-7.4.33-150400.4.34.1
* php7-xsl-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-debuginfo-7.4.33-150400.4.34.1
* php7-fastcgi-7.4.33-150400.4.34.1
* php7-curl-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-7.4.33-150400.4.34.1
* php7-calendar-7.4.33-150400.4.34.1
* php7-calendar-debuginfo-7.4.33-150400.4.34.1
* php7-exif-7.4.33-150400.4.34.1
* php7-fileinfo-7.4.33-150400.4.34.1
* php7-mbstring-7.4.33-150400.4.34.1
* php7-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-7.4.33-150400.4.34.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.34.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.34.1
* php7-gettext-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-debuginfo-7.4.33-150400.4.34.1
* php7-soap-debuginfo-7.4.33-150400.4.34.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.34.1
* php7-readline-debuginfo-7.4.33-150400.4.34.1
* php7-dom-7.4.33-150400.4.34.1
* php7-gd-7.4.33-150400.4.34.1
* php7-ctype-7.4.33-150400.4.34.1
* php7-sqlite-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-7.4.33-150400.4.34.1
* php7-fastcgi-debugsource-7.4.33-150400.4.34.1
* php7-shmop-debuginfo-7.4.33-150400.4.34.1
* php7-phar-debuginfo-7.4.33-150400.4.34.1
* php7-pgsql-7.4.33-150400.4.34.1
* php7-odbc-7.4.33-150400.4.34.1
* php7-zip-7.4.33-150400.4.34.1
* php7-gmp-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-debuginfo-7.4.33-150400.4.34.1
* php7-dba-7.4.33-150400.4.34.1
* php7-exif-debuginfo-7.4.33-150400.4.34.1
* php7-sysvsem-7.4.33-150400.4.34.1
* php7-snmp-debuginfo-7.4.33-150400.4.34.1
* php7-cli-7.4.33-150400.4.34.1
* php7-odbc-debuginfo-7.4.33-150400.4.34.1
* php7-pdo-debuginfo-7.4.33-150400.4.34.1
* php7-devel-7.4.33-150400.4.34.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.34.1
* php7-bcmath-7.4.33-150400.4.34.1
* php7-pcntl-7.4.33-150400.4.34.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.34.1
* php7-snmp-7.4.33-150400.4.34.1
* php7-bcmath-debuginfo-7.4.33-150400.4.34.1
* php7-intl-7.4.33-150400.4.34.1
* php7-embed-debuginfo-7.4.33-150400.4.34.1
* php7-sysvshm-7.4.33-150400.4.34.1
* php7-dom-debuginfo-7.4.33-150400.4.34.1
* php7-mysql-7.4.33-150400.4.34.1
* php7-sockets-7.4.33-150400.4.34.1
* php7-ctype-debuginfo-7.4.33-150400.4.34.1
* php7-pcntl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debugsource-7.4.33-150400.4.34.1
* php7-pgsql-debuginfo-7.4.33-150400.4.34.1
* php7-sodium-debuginfo-7.4.33-150400.4.34.1
* php7-embed-7.4.33-150400.4.34.1
* php7-curl-7.4.33-150400.4.34.1
* php7-sockets-debuginfo-7.4.33-150400.4.34.1
* php7-posix-7.4.33-150400.4.34.1
* php7-ldap-7.4.33-150400.4.34.1
* php7-enchant-7.4.33-150400.4.34.1
* php7-mysql-debuginfo-7.4.33-150400.4.34.1
* php7-tokenizer-7.4.33-150400.4.34.1
* php7-enchant-debuginfo-7.4.33-150400.4.34.1
* php7-json-debuginfo-7.4.33-150400.4.34.1
* php7-phar-7.4.33-150400.4.34.1
* php7-xmlrpc-7.4.33-150400.4.34.1
* php7-openssl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debuginfo-7.4.33-150400.4.34.1
* apache2-mod_php7-7.4.33-150400.4.34.1
* php7-ldap-debuginfo-7.4.33-150400.4.34.1
* php7-sqlite-7.4.33-150400.4.34.1
* php7-debugsource-7.4.33-150400.4.34.1
* php7-sysvmsg-7.4.33-150400.4.34.1
* php7-tidy-7.4.33-150400.4.34.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.34.1
* php7-xmlwriter-7.4.33-150400.4.34.1
* php7-fpm-7.4.33-150400.4.34.1
* php7-gd-debuginfo-7.4.33-150400.4.34.1
* php7-openssl-7.4.33-150400.4.34.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.34.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.34.1
* php7-test-7.4.33-150400.4.34.1
* php7-pdo-7.4.33-150400.4.34.1
* php7-readline-7.4.33-150400.4.34.1
* php7-json-7.4.33-150400.4.34.1
* php7-mbstring-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-7.4.33-150400.4.34.1
* php7-xsl-7.4.33-150400.4.34.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-mod_php7-debugsource-7.4.33-150400.4.34.1
* php7-gmp-7.4.33-150400.4.34.1
* php7-gettext-7.4.33-150400.4.34.1
* php7-sodium-7.4.33-150400.4.34.1
* php7-posix-debuginfo-7.4.33-150400.4.34.1
* php7-soap-7.4.33-150400.4.34.1
* php7-zip-debuginfo-7.4.33-150400.4.34.1
* php7-xmlreader-7.4.33-150400.4.34.1
* php7-tidy-debuginfo-7.4.33-150400.4.34.1
* php7-dba-debuginfo-7.4.33-150400.4.34.1
* php7-fileinfo-debuginfo-7.4.33-150400.4.34.1
* php7-intl-debuginfo-7.4.33-150400.4.34.1
* php7-cli-debuginfo-7.4.33-150400.4.34.1
* php7-shmop-7.4.33-150400.4.34.1
* php7-xmlreader-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-7.4.33-150400.4.34.1
* php7-7.4.33-150400.4.34.1
* php7-xsl-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-debuginfo-7.4.33-150400.4.34.1
* php7-fastcgi-7.4.33-150400.4.34.1
* php7-curl-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-7.4.33-150400.4.34.1
* php7-calendar-7.4.33-150400.4.34.1
* php7-calendar-debuginfo-7.4.33-150400.4.34.1
* php7-exif-7.4.33-150400.4.34.1
* php7-fileinfo-7.4.33-150400.4.34.1
* php7-mbstring-7.4.33-150400.4.34.1
* php7-debuginfo-7.4.33-150400.4.34.1
* php7-bz2-7.4.33-150400.4.34.1
* php7-fastcgi-debuginfo-7.4.33-150400.4.34.1
* php7-sysvshm-debuginfo-7.4.33-150400.4.34.1
* php7-gettext-debuginfo-7.4.33-150400.4.34.1
* php7-iconv-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-debuginfo-7.4.33-150400.4.34.1
* php7-soap-debuginfo-7.4.33-150400.4.34.1
* php7-xmlrpc-debuginfo-7.4.33-150400.4.34.1
* php7-readline-debuginfo-7.4.33-150400.4.34.1
* php7-dom-7.4.33-150400.4.34.1
* php7-gd-7.4.33-150400.4.34.1
* php7-ctype-7.4.33-150400.4.34.1
* php7-sqlite-debuginfo-7.4.33-150400.4.34.1
* php7-ftp-7.4.33-150400.4.34.1
* php7-fastcgi-debugsource-7.4.33-150400.4.34.1
* php7-shmop-debuginfo-7.4.33-150400.4.34.1
* php7-phar-debuginfo-7.4.33-150400.4.34.1
* php7-pgsql-7.4.33-150400.4.34.1
* php7-odbc-7.4.33-150400.4.34.1
* php7-zip-7.4.33-150400.4.34.1
* php7-gmp-debuginfo-7.4.33-150400.4.34.1
* php7-zlib-debuginfo-7.4.33-150400.4.34.1
* php7-dba-7.4.33-150400.4.34.1
* php7-exif-debuginfo-7.4.33-150400.4.34.1
* php7-sysvsem-7.4.33-150400.4.34.1
* php7-snmp-debuginfo-7.4.33-150400.4.34.1
* php7-cli-7.4.33-150400.4.34.1
* php7-odbc-debuginfo-7.4.33-150400.4.34.1
* php7-pdo-debuginfo-7.4.33-150400.4.34.1
* php7-devel-7.4.33-150400.4.34.1
* php7-xmlwriter-debuginfo-7.4.33-150400.4.34.1
* php7-bcmath-7.4.33-150400.4.34.1
* php7-pcntl-7.4.33-150400.4.34.1
* php7-sysvsem-debuginfo-7.4.33-150400.4.34.1
* php7-snmp-7.4.33-150400.4.34.1
* php7-bcmath-debuginfo-7.4.33-150400.4.34.1
* php7-intl-7.4.33-150400.4.34.1
* php7-sysvshm-7.4.33-150400.4.34.1
* php7-dom-debuginfo-7.4.33-150400.4.34.1
* php7-mysql-7.4.33-150400.4.34.1
* php7-sockets-7.4.33-150400.4.34.1
* php7-ctype-debuginfo-7.4.33-150400.4.34.1
* php7-pcntl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debugsource-7.4.33-150400.4.34.1
* php7-pgsql-debuginfo-7.4.33-150400.4.34.1
* php7-sodium-debuginfo-7.4.33-150400.4.34.1
* php7-curl-7.4.33-150400.4.34.1
* php7-sockets-debuginfo-7.4.33-150400.4.34.1
* php7-posix-7.4.33-150400.4.34.1
* php7-ldap-7.4.33-150400.4.34.1
* php7-enchant-7.4.33-150400.4.34.1
* php7-mysql-debuginfo-7.4.33-150400.4.34.1
* php7-tokenizer-7.4.33-150400.4.34.1
* php7-enchant-debuginfo-7.4.33-150400.4.34.1
* php7-json-debuginfo-7.4.33-150400.4.34.1
* php7-phar-7.4.33-150400.4.34.1
* php7-xmlrpc-7.4.33-150400.4.34.1
* php7-openssl-debuginfo-7.4.33-150400.4.34.1
* php7-fpm-debuginfo-7.4.33-150400.4.34.1
* apache2-mod_php7-7.4.33-150400.4.34.1
* php7-ldap-debuginfo-7.4.33-150400.4.34.1
* php7-sqlite-7.4.33-150400.4.34.1
* php7-debugsource-7.4.33-150400.4.34.1
* php7-sysvmsg-7.4.33-150400.4.34.1
* php7-tidy-7.4.33-150400.4.34.1
* php7-tokenizer-debuginfo-7.4.33-150400.4.34.1
* php7-xmlwriter-7.4.33-150400.4.34.1
* php7-fpm-7.4.33-150400.4.34.1
* php7-gd-debuginfo-7.4.33-150400.4.34.1
* php7-openssl-7.4.33-150400.4.34.1
* apache2-mod_php7-debuginfo-7.4.33-150400.4.34.1
* php7-sysvmsg-debuginfo-7.4.33-150400.4.34.1
* php7-pdo-7.4.33-150400.4.34.1
* php7-readline-7.4.33-150400.4.34.1
* php7-json-7.4.33-150400.4.34.1
* php7-mbstring-debuginfo-7.4.33-150400.4.34.1
* php7-opcache-7.4.33-150400.4.34.1
* php7-xsl-7.4.33-150400.4.34.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* php7-embed-debugsource-7.4.33-150400.4.34.1
* php7-embed-7.4.33-150400.4.34.1
* php7-embed-debuginfo-7.4.33-150400.4.34.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2756.html
* https://www.suse.com/security/cve/CVE-2024-3096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222857
* https://bugzilla.suse.com/show_bug.cgi?id=1222858
1
0
# Security update for php8
Announcement ID: SUSE-SU-2024:1446-1
Rating: moderate
References:
* bsc#1222857
* bsc#1222858
Cross-References:
* CVE-2024-2756
* CVE-2024-3096
CVSS scores:
* CVE-2024-2756 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-3096 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for php8 fixes the following issues:
* CVE-2024-2756: Fixed bypass of security fix applied for CVE-2022-31629 that
lead PHP to consider not secure cookies as secure (bsc#1222857)
* CVE-2024-3096: Fixed bypass on null byte leading passwords checked via
password_verify (bsc#1222858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1446=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1446=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1446=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php8-zlib-8.0.30-150400.4.40.1
* php8-tidy-8.0.30-150400.4.40.1
* php8-sodium-debuginfo-8.0.30-150400.4.40.1
* php8-dom-debuginfo-8.0.30-150400.4.40.1
* php8-soap-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-8.0.30-150400.4.40.1
* php8-bz2-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-debuginfo-8.0.30-150400.4.40.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.40.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.40.1
* php8-exif-8.0.30-150400.4.40.1
* php8-pdo-8.0.30-150400.4.40.1
* php8-sysvmsg-8.0.30-150400.4.40.1
* php8-mbstring-8.0.30-150400.4.40.1
* php8-dba-debuginfo-8.0.30-150400.4.40.1
* php8-zlib-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-debuginfo-8.0.30-150400.4.40.1
* php8-posix-8.0.30-150400.4.40.1
* php8-dom-8.0.30-150400.4.40.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.40.1
* php8-zip-debuginfo-8.0.30-150400.4.40.1
* php8-pdo-debuginfo-8.0.30-150400.4.40.1
* php8-snmp-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-8.0.30-150400.4.40.1
* php8-ftp-debuginfo-8.0.30-150400.4.40.1
* php8-sysvsem-8.0.30-150400.4.40.1
* php8-ftp-8.0.30-150400.4.40.1
* php8-mbstring-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debugsource-8.0.30-150400.4.40.1
* php8-xmlwriter-8.0.30-150400.4.40.1
* php8-gd-8.0.30-150400.4.40.1
* php8-pgsql-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-debuginfo-8.0.30-150400.4.40.1
* php8-embed-debuginfo-8.0.30-150400.4.40.1
* php8-shmop-8.0.30-150400.4.40.1
* php8-sockets-8.0.30-150400.4.40.1
* php8-debuginfo-8.0.30-150400.4.40.1
* php8-fileinfo-8.0.30-150400.4.40.1
* php8-exif-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-8.0.30-150400.4.40.1
* php8-posix-debuginfo-8.0.30-150400.4.40.1
* php8-cli-8.0.30-150400.4.40.1
* php8-devel-8.0.30-150400.4.40.1
* php8-fastcgi-8.0.30-150400.4.40.1
* php8-fastcgi-debugsource-8.0.30-150400.4.40.1
* php8-shmop-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-debuginfo-8.0.30-150400.4.40.1
* php8-zip-8.0.30-150400.4.40.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.40.1
* php8-phar-debuginfo-8.0.30-150400.4.40.1
* php8-cli-debuginfo-8.0.30-150400.4.40.1
* php8-gmp-8.0.30-150400.4.40.1
* php8-gmp-debuginfo-8.0.30-150400.4.40.1
* php8-tokenizer-8.0.30-150400.4.40.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.40.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-debuginfo-8.0.30-150400.4.40.1
* php8-iconv-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-8.0.30-150400.4.40.1
* php8-iconv-8.0.30-150400.4.40.1
* php8-sqlite-8.0.30-150400.4.40.1
* php8-test-8.0.30-150400.4.40.1
* php8-openssl-debuginfo-8.0.30-150400.4.40.1
* php8-dba-8.0.30-150400.4.40.1
* php8-enchant-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-8.0.30-150400.4.40.1
* php8-opcache-8.0.30-150400.4.40.1
* php8-phar-8.0.30-150400.4.40.1
* php8-soap-8.0.30-150400.4.40.1
* php8-bz2-8.0.30-150400.4.40.1
* php8-embed-debugsource-8.0.30-150400.4.40.1
* php8-embed-8.0.30-150400.4.40.1
* php8-fpm-8.0.30-150400.4.40.1
* php8-xmlreader-8.0.30-150400.4.40.1
* php8-sodium-8.0.30-150400.4.40.1
* php8-ctype-8.0.30-150400.4.40.1
* php8-snmp-8.0.30-150400.4.40.1
* php8-mysql-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-8.0.30-150400.4.40.1
* php8-ctype-debuginfo-8.0.30-150400.4.40.1
* php8-8.0.30-150400.4.40.1
* php8-pcntl-debuginfo-8.0.30-150400.4.40.1
* php8-readline-8.0.30-150400.4.40.1
* php8-mysql-8.0.30-150400.4.40.1
* php8-openssl-8.0.30-150400.4.40.1
* php8-sockets-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-8.0.30-150400.4.40.1
* php8-readline-debuginfo-8.0.30-150400.4.40.1
* php8-debugsource-8.0.30-150400.4.40.1
* php8-opcache-debuginfo-8.0.30-150400.4.40.1
* php8-pgsql-8.0.30-150400.4.40.1
* php8-intl-8.0.30-150400.4.40.1
* php8-pcntl-8.0.30-150400.4.40.1
* php8-sysvshm-8.0.30-150400.4.40.1
* php8-sqlite-debuginfo-8.0.30-150400.4.40.1
* php8-tidy-debuginfo-8.0.30-150400.4.40.1
* php8-curl-debuginfo-8.0.30-150400.4.40.1
* php8-gd-debuginfo-8.0.30-150400.4.40.1
* php8-enchant-8.0.30-150400.4.40.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.40.1
* php8-intl-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debuginfo-8.0.30-150400.4.40.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.40.1
* php8-curl-8.0.30-150400.4.40.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.40.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* php8-zlib-8.0.30-150400.4.40.1
* php8-tidy-8.0.30-150400.4.40.1
* php8-sodium-debuginfo-8.0.30-150400.4.40.1
* php8-dom-debuginfo-8.0.30-150400.4.40.1
* php8-soap-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-8.0.30-150400.4.40.1
* php8-bz2-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-debuginfo-8.0.30-150400.4.40.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.40.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.40.1
* php8-exif-8.0.30-150400.4.40.1
* php8-pdo-8.0.30-150400.4.40.1
* php8-sysvmsg-8.0.30-150400.4.40.1
* php8-mbstring-8.0.30-150400.4.40.1
* php8-dba-debuginfo-8.0.30-150400.4.40.1
* php8-zlib-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-debuginfo-8.0.30-150400.4.40.1
* php8-posix-8.0.30-150400.4.40.1
* php8-dom-8.0.30-150400.4.40.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.40.1
* php8-zip-debuginfo-8.0.30-150400.4.40.1
* php8-pdo-debuginfo-8.0.30-150400.4.40.1
* php8-snmp-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-8.0.30-150400.4.40.1
* php8-ftp-debuginfo-8.0.30-150400.4.40.1
* php8-sysvsem-8.0.30-150400.4.40.1
* php8-ftp-8.0.30-150400.4.40.1
* php8-mbstring-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debugsource-8.0.30-150400.4.40.1
* php8-xmlwriter-8.0.30-150400.4.40.1
* php8-gd-8.0.30-150400.4.40.1
* php8-pgsql-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-debuginfo-8.0.30-150400.4.40.1
* php8-embed-debuginfo-8.0.30-150400.4.40.1
* php8-shmop-8.0.30-150400.4.40.1
* php8-sockets-8.0.30-150400.4.40.1
* php8-debuginfo-8.0.30-150400.4.40.1
* php8-fileinfo-8.0.30-150400.4.40.1
* php8-exif-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-8.0.30-150400.4.40.1
* php8-posix-debuginfo-8.0.30-150400.4.40.1
* php8-cli-8.0.30-150400.4.40.1
* php8-devel-8.0.30-150400.4.40.1
* php8-fastcgi-8.0.30-150400.4.40.1
* php8-shmop-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-debuginfo-8.0.30-150400.4.40.1
* php8-zip-8.0.30-150400.4.40.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.40.1
* php8-phar-debuginfo-8.0.30-150400.4.40.1
* php8-cli-debuginfo-8.0.30-150400.4.40.1
* php8-gmp-8.0.30-150400.4.40.1
* php8-gmp-debuginfo-8.0.30-150400.4.40.1
* php8-tokenizer-8.0.30-150400.4.40.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.40.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-debuginfo-8.0.30-150400.4.40.1
* php8-iconv-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-8.0.30-150400.4.40.1
* php8-iconv-8.0.30-150400.4.40.1
* php8-sqlite-8.0.30-150400.4.40.1
* php8-test-8.0.30-150400.4.40.1
* php8-openssl-debuginfo-8.0.30-150400.4.40.1
* php8-dba-8.0.30-150400.4.40.1
* php8-enchant-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-8.0.30-150400.4.40.1
* php8-opcache-8.0.30-150400.4.40.1
* php8-phar-8.0.30-150400.4.40.1
* php8-soap-8.0.30-150400.4.40.1
* php8-bz2-8.0.30-150400.4.40.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.40.1
* php8-embed-debugsource-8.0.30-150400.4.40.1
* php8-embed-8.0.30-150400.4.40.1
* php8-fpm-8.0.30-150400.4.40.1
* php8-xmlreader-8.0.30-150400.4.40.1
* php8-sodium-8.0.30-150400.4.40.1
* php8-ctype-8.0.30-150400.4.40.1
* php8-snmp-8.0.30-150400.4.40.1
* php8-mysql-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-8.0.30-150400.4.40.1
* php8-ctype-debuginfo-8.0.30-150400.4.40.1
* php8-8.0.30-150400.4.40.1
* php8-pcntl-debuginfo-8.0.30-150400.4.40.1
* php8-readline-8.0.30-150400.4.40.1
* php8-mysql-8.0.30-150400.4.40.1
* php8-openssl-8.0.30-150400.4.40.1
* php8-sockets-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-8.0.30-150400.4.40.1
* php8-readline-debuginfo-8.0.30-150400.4.40.1
* php8-debugsource-8.0.30-150400.4.40.1
* php8-opcache-debuginfo-8.0.30-150400.4.40.1
* php8-pgsql-8.0.30-150400.4.40.1
* php8-intl-8.0.30-150400.4.40.1
* php8-pcntl-8.0.30-150400.4.40.1
* php8-sqlite-debuginfo-8.0.30-150400.4.40.1
* php8-sysvshm-8.0.30-150400.4.40.1
* php8-tidy-debuginfo-8.0.30-150400.4.40.1
* php8-curl-debuginfo-8.0.30-150400.4.40.1
* php8-gd-debuginfo-8.0.30-150400.4.40.1
* php8-enchant-8.0.30-150400.4.40.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.40.1
* php8-intl-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debuginfo-8.0.30-150400.4.40.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.40.1
* php8-curl-8.0.30-150400.4.40.1
* php8-fastcgi-debugsource-8.0.30-150400.4.40.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* php8-zlib-8.0.30-150400.4.40.1
* php8-tidy-8.0.30-150400.4.40.1
* php8-sodium-debuginfo-8.0.30-150400.4.40.1
* php8-dom-debuginfo-8.0.30-150400.4.40.1
* php8-soap-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-8.0.30-150400.4.40.1
* php8-bz2-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-debuginfo-8.0.30-150400.4.40.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.40.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.40.1
* php8-exif-8.0.30-150400.4.40.1
* php8-pdo-8.0.30-150400.4.40.1
* php8-sysvmsg-8.0.30-150400.4.40.1
* php8-mbstring-8.0.30-150400.4.40.1
* php8-dba-debuginfo-8.0.30-150400.4.40.1
* php8-zlib-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-debuginfo-8.0.30-150400.4.40.1
* php8-posix-8.0.30-150400.4.40.1
* php8-dom-8.0.30-150400.4.40.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.40.1
* php8-zip-debuginfo-8.0.30-150400.4.40.1
* php8-pdo-debuginfo-8.0.30-150400.4.40.1
* php8-snmp-debuginfo-8.0.30-150400.4.40.1
* php8-bcmath-8.0.30-150400.4.40.1
* php8-ftp-debuginfo-8.0.30-150400.4.40.1
* php8-sysvsem-8.0.30-150400.4.40.1
* php8-ftp-8.0.30-150400.4.40.1
* php8-mbstring-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debugsource-8.0.30-150400.4.40.1
* php8-xmlwriter-8.0.30-150400.4.40.1
* php8-gd-8.0.30-150400.4.40.1
* php8-pgsql-debuginfo-8.0.30-150400.4.40.1
* php8-odbc-debuginfo-8.0.30-150400.4.40.1
* php8-embed-debuginfo-8.0.30-150400.4.40.1
* php8-shmop-8.0.30-150400.4.40.1
* php8-sockets-8.0.30-150400.4.40.1
* php8-debuginfo-8.0.30-150400.4.40.1
* php8-fileinfo-8.0.30-150400.4.40.1
* php8-exif-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-8.0.30-150400.4.40.1
* php8-posix-debuginfo-8.0.30-150400.4.40.1
* php8-cli-8.0.30-150400.4.40.1
* php8-devel-8.0.30-150400.4.40.1
* php8-fastcgi-8.0.30-150400.4.40.1
* php8-shmop-debuginfo-8.0.30-150400.4.40.1
* php8-ldap-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-debuginfo-8.0.30-150400.4.40.1
* php8-zip-8.0.30-150400.4.40.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.40.1
* php8-phar-debuginfo-8.0.30-150400.4.40.1
* php8-cli-debuginfo-8.0.30-150400.4.40.1
* php8-gmp-8.0.30-150400.4.40.1
* php8-gmp-debuginfo-8.0.30-150400.4.40.1
* php8-tokenizer-8.0.30-150400.4.40.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.40.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-debuginfo-8.0.30-150400.4.40.1
* php8-iconv-debuginfo-8.0.30-150400.4.40.1
* apache2-mod_php8-8.0.30-150400.4.40.1
* php8-iconv-8.0.30-150400.4.40.1
* php8-sqlite-8.0.30-150400.4.40.1
* php8-test-8.0.30-150400.4.40.1
* php8-openssl-debuginfo-8.0.30-150400.4.40.1
* php8-dba-8.0.30-150400.4.40.1
* php8-enchant-debuginfo-8.0.30-150400.4.40.1
* php8-calendar-8.0.30-150400.4.40.1
* php8-opcache-8.0.30-150400.4.40.1
* php8-phar-8.0.30-150400.4.40.1
* php8-soap-8.0.30-150400.4.40.1
* php8-bz2-8.0.30-150400.4.40.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.40.1
* php8-embed-debugsource-8.0.30-150400.4.40.1
* php8-embed-8.0.30-150400.4.40.1
* php8-fpm-8.0.30-150400.4.40.1
* php8-xmlreader-8.0.30-150400.4.40.1
* php8-sodium-8.0.30-150400.4.40.1
* php8-ctype-8.0.30-150400.4.40.1
* php8-snmp-8.0.30-150400.4.40.1
* php8-mysql-debuginfo-8.0.30-150400.4.40.1
* php8-gettext-8.0.30-150400.4.40.1
* php8-ctype-debuginfo-8.0.30-150400.4.40.1
* php8-8.0.30-150400.4.40.1
* php8-pcntl-debuginfo-8.0.30-150400.4.40.1
* php8-readline-8.0.30-150400.4.40.1
* php8-mysql-8.0.30-150400.4.40.1
* php8-openssl-8.0.30-150400.4.40.1
* php8-sockets-debuginfo-8.0.30-150400.4.40.1
* php8-xsl-8.0.30-150400.4.40.1
* php8-readline-debuginfo-8.0.30-150400.4.40.1
* php8-debugsource-8.0.30-150400.4.40.1
* php8-opcache-debuginfo-8.0.30-150400.4.40.1
* php8-pgsql-8.0.30-150400.4.40.1
* php8-intl-8.0.30-150400.4.40.1
* php8-pcntl-8.0.30-150400.4.40.1
* php8-sqlite-debuginfo-8.0.30-150400.4.40.1
* php8-sysvshm-8.0.30-150400.4.40.1
* php8-tidy-debuginfo-8.0.30-150400.4.40.1
* php8-curl-debuginfo-8.0.30-150400.4.40.1
* php8-gd-debuginfo-8.0.30-150400.4.40.1
* php8-enchant-8.0.30-150400.4.40.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.40.1
* php8-intl-debuginfo-8.0.30-150400.4.40.1
* php8-fpm-debuginfo-8.0.30-150400.4.40.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.40.1
* php8-curl-8.0.30-150400.4.40.1
* php8-fastcgi-debugsource-8.0.30-150400.4.40.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2756.html
* https://www.suse.com/security/cve/CVE-2024-3096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222857
* https://bugzilla.suse.com/show_bug.cgi?id=1222858
1
0
SUSE-SU-2024:1437-1: important: Security update for MozillaThunderbird
by OPENSUSE-UPDATES 25 Apr '24
by OPENSUSE-UPDATES 25 Apr '24
25 Apr '24
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:1437-1
Rating: important
References:
* bsc#1222535
Cross-References:
* CVE-2024-2609
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3854
* CVE-2024-3857
* CVE-2024-3859
* CVE-2024-3861
* CVE-2024-3863
* CVE-2024-3864
CVSS scores:
* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves nine vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
Update to Mozilla Thunderbird 115.10.1
Security fixes (MFSA 2024-20) (bsc#1222535):
* CVE-2024-3852: GetBoundName in the JIT returned the wrong object
(bmo#1883542)
* CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
(bmo#1884552)
* CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during
garbage collection (bmo#1886683)
* CVE-2024-2609: Permission prompt input delay could expire when not in focus
(bmo#1866100)
* CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType
sanitizer (bmo#1874489)
* CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
(bmo#1883158)
* CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on
Windows (bmo#1885855)
* CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
(bmo#1881183, https://kb.cert.org/vuls/id/421644)
* CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10,
and Thunderbird 115.10 (bmo#1888333)
Other Fixes: * fixed: Thunderbird processes did not exit cleanly; user
intervention was required via task manager (bmo#1891889) * unresolved: After
changing password on an IMAP account, the account could become locked due to too
many failed login attempts (bmo#1862111) * fixed: Creating a tag in General
Settings with a number as the tag name did not work (bmo#1881124) * fixed: Quick
Filter button selections did not persist after restart (bmo#1847265) * fixed:
Collapsing and expanding message list headers sometimes caused header to scroll
out of view (bmo#1862197) * fixed: Single message with no children inside a
parent thread sometimes displayed incorrectly as a thread with a duplicate of
itself as its child (bmo#1427546) * fixed: "Get selected messages" menu items
did not work (bmo#1867091) * fixed: "Download and Sync Messages" dialog was too
short when using Russian locale, obscuring OK button (bmo#1881795) * fixed:
After changing password on an IMAP account, the account could become locked due
to too many failed login attempts (bmo#1862111) * fixed: Retrieving multiline
POP3 message from server failed if message chunk ended in newline instead of
carriage return and newline (bmo#1883760) * fixed: IMAP, POP3, and SMTP Exchange
autoconfiguration did not support encryption configuration (bmo#1876992) *
fixed: Non-empty address book search bar interfered with displaying/editing
contacts (bmo#1833031) * fixed: Deleting attendees from "Invite Attendees" view
removed attendees from view, but not from invite (bmo#1874450) * fixed: Splitter
arrow between task list and task description did not behave as expected
(bmo#1889562) * fixed: Performance improvements and code cleanup
(bmo#1878257,bmo#1883550) * fixed: Security fixes * unresolved: Thunderbird
processes did not exit cleanly; user intervention was required via task manager
(bmo#1891889)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1437=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1437=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1437=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1437=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debugsource-115.10.1-150200.8.157.1
* MozillaThunderbird-debuginfo-115.10.1-150200.8.157.1
* MozillaThunderbird-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-common-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-other-115.10.1-150200.8.157.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debugsource-115.10.1-150200.8.157.1
* MozillaThunderbird-debuginfo-115.10.1-150200.8.157.1
* MozillaThunderbird-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-common-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-other-115.10.1-150200.8.157.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaThunderbird-debugsource-115.10.1-150200.8.157.1
* MozillaThunderbird-debuginfo-115.10.1-150200.8.157.1
* MozillaThunderbird-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-common-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-other-115.10.1-150200.8.157.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debugsource-115.10.1-150200.8.157.1
* MozillaThunderbird-debuginfo-115.10.1-150200.8.157.1
* MozillaThunderbird-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-common-115.10.1-150200.8.157.1
* MozillaThunderbird-translations-other-115.10.1-150200.8.157.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222535
1
0
openSUSE-SU-2024:0113-1: important: Security update for dcmtk
by opensuse-security@opensuse.org 25 Apr '24
by opensuse-security@opensuse.org 25 Apr '24
25 Apr '24
openSUSE Security Update: Security update for dcmtk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0113-1
Rating: important
References: #1220809 #1223324
Cross-References: CVE-2024-28130
CVSS scores:
CVE-2024-28130 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for dcmtk fixes the following issues:
* Fixed incorrect type conversion in the
DVPSSoftcopyVOI_PList:createFromImage functionality of OFFIS DCMTK
(boo#1223324, CVE-2024-28130)
- Add missing requirements for dcmtk-devel (boo#1220809)
- Update to 3.6.8 See DOCS/CHANGES.368 for the full list of changes
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-113=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
dcmtk-3.6.8-bp155.3.3.1
dcmtk-devel-3.6.8-bp155.3.3.1
libdcmtk18-3.6.8-bp155.3.3.1
References:
https://www.suse.com/security/cve/CVE-2024-28130.html
https://bugzilla.suse.com/1220809
https://bugzilla.suse.com/1223324
1
0
SUSE-RU-2024:1436-1: moderate: Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 25 Apr '24
by OPENSUSE-UPDATES 25 Apr '24
25 Apr '24
# Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed
Announcement ID: SUSE-RU-2024:1436-1
Rating: moderate
References:
* bsc#1222972
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:
Changes in kernel-firmware-nvidia-gspx-G06:
* update firmware to version 550.76 (bsc#1222972)
Changes in nvidia-open-driver-G06-signed:
* Update to 550.76 (bsc#1222972)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1436=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1436=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1436=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1436=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1436=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1436=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1436=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1436=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1436=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1436=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1436=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1436=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1436=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-64kb-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.76_k5.14.21_150400.24.116-150400.9.56.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-64kb-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.76_k5.14.21_150400.24.116-150400.9.56.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-64kb-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.76_k5.14.21_150400.24.116-150400.9.56.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Manager Proxy 4.3 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* SUSE Manager Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* SUSE Manager Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* openSUSE Leap 15.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.76-150400.9.27.1
* openSUSE Leap 15.4 (x86_64)
* nvidia-open-driver-G06-signed-azure-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.76_k5.14.21_150400.14.75-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-azure-550.76_k5.14.21_150400.14.75-150400.9.56.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-default-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-debugsource-550.76-150400.9.56.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.76_k5.14.21_150400.24.116-150400.9.56.1
* nvidia-open-driver-G06-signed-64kb-devel-550.76-150400.9.56.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.76_k5.14.21_150400.24.116-150400.9.56.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222972
1
0
SUSE-RU-2024:1429-1: moderate: Recommended update for ca-certificates
by OPENSUSE-UPDATES 24 Apr '24
by OPENSUSE-UPDATES 24 Apr '24
24 Apr '24
# Recommended update for ca-certificates
Announcement ID: SUSE-RU-2024:1429-1
Rating: moderate
References:
* bsc#1188500
* bsc#1221184
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for ca-certificates fixes the following issue:
* Update version (bsc#1221184)
* Use flock to serialize calls (bsc#1188500)
* Make certbundle.run container friendly
* Create /var/lib/ca-certificates if needed
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1429=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1429=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1429=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1429=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1429=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1429=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1429=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1429=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1429=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1429=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1429=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1429=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1429=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1429=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1429=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1429=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1429=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1429=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1429=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1429=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1429=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1429=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1429=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1429=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1429=1
## Package List:
* openSUSE Leap 15.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* openSUSE Leap Micro 5.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* openSUSE Leap Micro 5.4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* openSUSE Leap 15.5 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro 5.5 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* Basesystem Module 15-SP5 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Manager Proxy 4.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Manager Server 4.3 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Enterprise Storage 7.1 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro 5.1 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro 5.2 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* ca-certificates-2+git20240416.98ae794-150300.4.3.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1188500
* https://bugzilla.suse.com/show_bug.cgi?id=1221184
1
0
SUSE-RU-2024:1432-1: moderate: Recommended update for post-build-checks-malwarescan
by OPENSUSE-UPDATES 24 Apr '24
by OPENSUSE-UPDATES 24 Apr '24
24 Apr '24
# Recommended update for post-build-checks-malwarescan
Announcement ID: SUSE-RU-2024:1432-1
Rating: moderate
References:
* bsc#1222509
Affected Products:
* openSUSE Leap 15.5
An update that has one fix can now be installed.
## Description:
This update for post-build-checks-malwarescan fixes the following issues:
* disable EXCLUDELIST, upstream false positive was fixed. bsc#1222509
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1432=1 openSUSE-SLE-15.5-2024-1432=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* post-build-checks-malwarescan-0.1-150500.20.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222509
1
0
SUSE-SU-2024:1418-1: important: Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)
by OPENSUSE-UPDATES 24 Apr '24
by OPENSUSE-UPDATES 24 Apr '24
24 Apr '24
# Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1418-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_92 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1418=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1418=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_92-default-7-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_19-debugsource-7-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_92-default-7-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_19-debugsource-7-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
24 Apr '24
# Recommended update for patterns-fonts
Announcement ID: SUSE-RU-2024:1412-1
Rating: moderate
References:
* bsc#1219553
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for patterns-fonts fixes the following issues:
* Added google-noto-sans-symbols-fonts and google-noto-sans-symbols2-fonts to
default installation, to enable terminal display special characters
(bsc#1219553)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1412=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1412=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1412=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1412=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1412=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1412=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1412=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1412=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1412=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1412=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1412=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1412=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1412=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1412=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1412=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1412=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1412=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Manager Proxy 4.3 (x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* patterns-fonts-fonts-20190130-150100.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1219553
1
0
SUSE-SU-2024:1411-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
by OPENSUSE-UPDATES 24 Apr '24
by OPENSUSE-UPDATES 24 Apr '24
24 Apr '24
# Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1411-1
Rating: important
References:
* bsc#1219296
* bsc#1220828
Cross-References:
* CVE-2023-52340
* CVE-2024-26622
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_108 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1411=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1411=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-3-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-3-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-3-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-3-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-3-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-3-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1406-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1406-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_31 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1407=1 SUSE-2024-1406=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1407=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1406=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1408=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1408=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_18-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_15-debugsource-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-10-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_18-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_15-debugsource-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-10-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_6-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_6-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-7-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1409-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1409-1
Rating: important
References:
* bsc#1219296
* bsc#1220828
Cross-References:
* CVE-2023-52340
* CVE-2024-26622
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_49 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1409=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1409=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_49-default-3-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-3-150500.11.8.1
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-3-150500.11.8.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_49-default-3-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-3-150500.11.8.1
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-3-150500.11.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1410-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1410-1
Rating: important
References:
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_39 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1410=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1410=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-6-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-6-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
# Security update for opensc
Announcement ID: SUSE-SU-2024:1402-1
Rating: moderate
References:
* bsc#1219386
Cross-References:
* CVE-2023-5992
CVSS scores:
* CVE-2023-5992 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-5992 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for opensc fixes the following issues:
* CVE-2023-5992: Fixed side-channel leaks while stripping encryption PKCS#1
padding (bsc#1219386)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1402=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1402=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1402=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1402=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1402=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1402=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1402=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1402=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1402=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1402=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* opensc-32bit-debuginfo-0.22.0-150400.3.9.1
* opensc-32bit-0.22.0-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* opensc-64bit-debuginfo-0.22.0-150400.3.9.1
* opensc-64bit-0.22.0-150400.3.9.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* openSUSE Leap 15.5 (x86_64)
* opensc-32bit-debuginfo-0.22.0-150400.3.9.1
* opensc-32bit-0.22.0-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* opensc-debuginfo-0.22.0-150400.3.9.1
* opensc-debugsource-0.22.0-150400.3.9.1
* opensc-0.22.0-150400.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5992.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219386
1
0
23 Apr '24
# Security update for kubernetes1.24
Announcement ID: SUSE-SU-2024:1403-1
Rating: low
References:
* bsc#1222539
Cross-References:
* CVE-2024-3177
CVSS scores:
* CVE-2024-3177 ( SUSE ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.24 fixes the following issues:
* CVE-2024-3177: Fixed bypass of mountable secrets policy imposed by the
ServiceAccount admission plugin (bsc#1222539)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1403=1 openSUSE-SLE-15.5-2024-1403=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1403=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-apiserver-1.24.17-150500.3.16.1
* kubernetes1.24-kubelet-1.24.17-150500.3.16.1
* kubernetes1.24-client-common-1.24.17-150500.3.16.1
* kubernetes1.24-kubeadm-1.24.17-150500.3.16.1
* kubernetes1.24-proxy-1.24.17-150500.3.16.1
* kubernetes1.24-controller-manager-1.24.17-150500.3.16.1
* kubernetes1.24-kubelet-common-1.24.17-150500.3.16.1
* kubernetes1.24-scheduler-1.24.17-150500.3.16.1
* kubernetes1.24-client-1.24.17-150500.3.16.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.24-client-fish-completion-1.24.17-150500.3.16.1
* kubernetes1.24-client-bash-completion-1.24.17-150500.3.16.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-client-1.24.17-150500.3.16.1
* kubernetes1.24-client-common-1.24.17-150500.3.16.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3177.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222539
1
0
23 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1404-1
Rating: low
References:
* bsc#1222539
Cross-References:
* CVE-2024-3177
CVSS scores:
* CVE-2024-3177 ( SUSE ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* CVE-2024-3177: Fixed bypass of mountable secrets policy imposed by the
ServiceAccount admission plugin (bsc#1222539)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1404=1 SUSE-2024-1404=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1404=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-kubeadm-1.23.17-150500.3.12.1
* kubernetes1.23-proxy-1.23.17-150500.3.12.1
* kubernetes1.23-kubelet-common-1.23.17-150500.3.12.1
* kubernetes1.23-controller-manager-1.23.17-150500.3.12.1
* kubernetes1.23-scheduler-1.23.17-150500.3.12.1
* kubernetes1.23-client-1.23.17-150500.3.12.1
* kubernetes1.23-client-common-1.23.17-150500.3.12.1
* kubernetes1.23-apiserver-1.23.17-150500.3.12.1
* kubernetes1.23-kubelet-1.23.17-150500.3.12.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.23-client-bash-completion-1.23.17-150500.3.12.1
* kubernetes1.23-client-fish-completion-1.23.17-150500.3.12.1
* openSUSE Leap 15.5 (ppc64le)
* kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.12.1
* kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.12.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-client-1.23.17-150500.3.12.1
* kubernetes1.23-client-common-1.23.17-150500.3.12.1
* Containers Module 15-SP5 (ppc64le)
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-3177.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222539
1
0
SUSE-SU-2024:1405-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1405-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_19 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1405=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1405=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_3-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-9-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_3-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-9-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-RU-2024:1392-1: moderate: Recommended update for sapconf, saptune, sysctl-logger
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Recommended update for sapconf, saptune, sysctl-logger
Announcement ID: SUSE-RU-2024:1392-1
Rating: moderate
References:
* bsc#1215933
* jsc#PED-6220
* jsc#PED-6221
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SAP Applications Module 15-SP4
* SAP Applications Module 15-SP5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains two features and has one fix can now be installed.
## Description:
This update for sapconf, saptune and sysctl-logger fixes the following issues:
sapconf, saptune:
* Added requirement for package `sysctl-logger` for SUSE Linux Enterprise 15
Service Pack 4 and Service Pack 5 (jsc#PED-6220, jsc#PED-6221)
sysctl-logger:
* New implementation at version v0.0.6, needed as required dependency for
`sapconf` and `saptune` (jsc#PED-6220)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1392=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1392=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1392=1
* SAP Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1392=1
* SAP Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1392=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1392=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1392=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1392=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1392=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1392=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1392=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1392=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1392=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* sapconf-5.0.7-150400.16.4.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* openSUSE Leap 15.4 (ppc64le x86_64)
* saptune-debuginfo-3.1.2-150400.15.4.1
* saptune-3.1.2-150400.15.4.1
* openSUSE Leap 15.5 (noarch)
* sapconf-5.0.7-150400.16.4.1
* openSUSE Leap 15.5 (ppc64le x86_64)
* saptune-debuginfo-3.1.2-150400.15.4.1
* saptune-3.1.2-150400.15.4.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SAP Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SAP Applications Module 15-SP4 (ppc64le x86_64)
* saptune-debuginfo-3.1.2-150400.15.4.1
* saptune-3.1.2-150400.15.4.1
* SAP Applications Module 15-SP5 (ppc64le x86_64)
* saptune-debuginfo-3.1.2-150400.15.4.1
* saptune-3.1.2-150400.15.4.1
* Server Applications Module 15-SP5 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Manager Proxy 4.3 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Manager Proxy 4.3 (x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
* SUSE Manager Server 4.3 (noarch)
* sapconf-5.0.7-150400.16.4.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* sysctl-logger-debugsource-0.0.6-150400.9.3.2
* sysctl-logger-debuginfo-0.0.6-150400.9.3.2
* sysctl-logger-0.0.6-150400.9.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1215933
* https://jira.suse.com/browse/PED-6220
* https://jira.suse.com/browse/PED-6221
1
0
23 Apr '24
# Recommended update for libserf
Announcement ID: SUSE-RU-2024:1393-1
Rating: moderate
References:
* bsc#1221211
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for libserf fixes the following issue:
* Fix build with openSSL 3 (bsc#1221211)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1393=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1393=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1393=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1393=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1393=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1393=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1393=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1393=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1393=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1393=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1393=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1393=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1393=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1393=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1393=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1393=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1393=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Manager Proxy 4.3 (x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libserf-1-1-1.3.9-150000.4.3.2
* libserf-debugsource-1.3.9-150000.4.3.2
* libserf-1-1-debuginfo-1.3.9-150000.4.3.2
* libserf-devel-1.3.9-150000.4.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221211
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:1394-1
Rating: important
References:
* bsc#1213269
* bsc#1218889
* bsc#1220134
* bsc#1222843
* bsc#1222845
Cross-References:
* CVE-2023-3019
* CVE-2023-6683
* CVE-2024-24474
* CVE-2024-3446
* CVE-2024-3447
CVSS scores:
* CVE-2023-3019 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-3019 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-6683 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6683 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24474 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-3446 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-3447 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest()
(bsc#1213269)
* CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request()
(bsc#1218889)
* CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI
command (bsc#1220134)
* CVE-2024-3446: Fixed DM reentrancy issue that could lead to double free
vulnerability (bsc#1222843)
* CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport()
(bsc#1222845)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1394=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1394=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1394=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1394=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1394=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1394=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1394=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1394=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1394=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1394=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1394=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-oss-6.2.0-150400.37.29.1
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-ivshmem-tools-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-extra-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* qemu-block-nfs-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-nfs-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-qtest-6.2.0-150400.37.29.1
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-gluster-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-dmg-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-extra-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-jack-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-smartcard-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-block-dmg-debuginfo-6.2.0-150400.37.29.1
* qemu-block-gluster-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.29.1
* qemu-linux-user-6.2.0-150400.37.29.1
* qemu-audio-jack-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-vhost-user-gpu-6.2.0-150400.37.29.1
* qemu-linux-user-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-audio-oss-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-linux-user-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-microvm-6.2.0-150400.37.29.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* openSUSE Leap Micro 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* openSUSE Leap Micro 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* openSUSE Leap Micro 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.29.1
* qemu-arm-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Proxy 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-6.2.0-150400.37.29.1
* qemu-tools-debuginfo-6.2.0-150400.37.29.1
* qemu-lang-6.2.0-150400.37.29.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.29.1
* qemu-block-ssh-6.2.0-150400.37.29.1
* qemu-chardev-baum-6.2.0-150400.37.29.1
* qemu-6.2.0-150400.37.29.1
* qemu-block-curl-6.2.0-150400.37.29.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.29.1
* qemu-tools-6.2.0-150400.37.29.1
* qemu-ui-curses-6.2.0-150400.37.29.1
* qemu-hw-usb-host-6.2.0-150400.37.29.1
* qemu-guest-agent-6.2.0-150400.37.29.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.29.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.29.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.29.1
* qemu-ksm-6.2.0-150400.37.29.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.29.1
* qemu-block-iscsi-6.2.0-150400.37.29.1
* qemu-debugsource-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1
* qemu-SLOF-6.2.0-150400.37.29.1
* qemu-skiboot-6.2.0-150400.37.29.1
* qemu-sgabios-8-150400.37.29.1
* qemu-ipxe-1.0.0+-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-6.2.0-150400.37.29.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.29.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1
* qemu-audio-spice-6.2.0-150400.37.29.1
* qemu-ui-gtk-6.2.0-150400.37.29.1
* qemu-ui-opengl-6.2.0-150400.37.29.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-usb-redirect-6.2.0-150400.37.29.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.29.1
* qemu-ui-spice-app-6.2.0-150400.37.29.1
* qemu-ui-spice-core-6.2.0-150400.37.29.1
* qemu-chardev-spice-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-6.2.0-150400.37.29.1
* qemu-ppc-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1
* qemu-kvm-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.29.1
* qemu-s390x-debuginfo-6.2.0-150400.37.29.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.29.1
* qemu-s390x-6.2.0-150400.37.29.1
* SUSE Manager Server 4.3 (x86_64)
* qemu-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.29.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.29.1
* qemu-accel-tcg-x86-6.2.0-150400.37.29.1
* qemu-audio-alsa-6.2.0-150400.37.29.1
* qemu-audio-pa-6.2.0-150400.37.29.1
* qemu-x86-6.2.0-150400.37.29.1
## References:
* https://www.suse.com/security/cve/CVE-2023-3019.html
* https://www.suse.com/security/cve/CVE-2023-6683.html
* https://www.suse.com/security/cve/CVE-2024-24474.html
* https://www.suse.com/security/cve/CVE-2024-3446.html
* https://www.suse.com/security/cve/CVE-2024-3447.html
* https://bugzilla.suse.com/show_bug.cgi?id=1213269
* https://bugzilla.suse.com/show_bug.cgi?id=1218889
* https://bugzilla.suse.com/show_bug.cgi?id=1220134
* https://bugzilla.suse.com/show_bug.cgi?id=1222843
* https://bugzilla.suse.com/show_bug.cgi?id=1222845
1
0
23 Apr '24
# Recommended update for gcc12
Announcement ID: SUSE-RU-2024:1397-1
Rating: moderate
References:
* bsc#1209055
* jsc#MSC-766
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that contains one feature and has one fix can now be installed.
## Description:
This update for gcc12 fixes the following issues:
* gcc12 D language packages are shipped to PackageHub 15 SP5.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1397=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1397=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1397=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1397=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1397=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1397=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1397=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1397=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1397=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1397=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1397=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1397=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1397=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1397=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1397=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1397=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1397=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1397=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1397=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1397=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1397=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1397=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1397=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1397=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1397=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* Development Tools Module 15-SP5 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* Development Tools Module 15-SP5 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-objc-12.3.0+git1204-150000.1.18.1
* gcc12-ada-12.3.0+git1204-150000.1.18.1
* libada12-12.3.0+git1204-150000.1.18.1
* libada12-debuginfo-12.3.0+git1204-150000.1.18.1
* libgo21-12.3.0+git1204-150000.1.18.1
* gcc12-ada-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-objc-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-go-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-go-12.3.0+git1204-150000.1.18.1
* libgo21-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-obj-c++-12.3.0+git1204-150000.1.18.1
* gcc12-obj-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* libgphobos3-12.3.0+git1204-150000.1.18.1
* libgdruntime3-12.3.0+git1204-150000.1.18.1
* libgdruntime3-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-d-debuginfo-12.3.0+git1204-150000.1.18.1
* libgphobos3-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-d-12.3.0+git1204-150000.1.18.1
* SUSE Package Hub 15 15-SP5 (x86_64)
* libada12-32bit-12.3.0+git1204-150000.1.18.1
* libgo21-32bit-12.3.0+git1204-150000.1.18.1
* libgo21-32bit-debuginfo-12.3.0+git1204-150000.1.18.1
* libgphobos3-32bit-12.3.0+git1204-150000.1.18.1
* libgdruntime3-32bit-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.18.1
* libada12-32bit-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-ada-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-objc-32bit-12.3.0+git1204-150000.1.18.1
* libgphobos3-32bit-debuginfo-12.3.0+git1204-150000.1.18.1
* libgdruntime3-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-go-32bit-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-testresults-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-testresults-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-testresults-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-testresults-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-testresults-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* SUSE Manager Proxy 4.3 (x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* gcc12-PIE-12.3.0+git1204-150000.1.18.1
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.18.1
* cpp12-12.3.0+git1204-150000.1.18.1
* gcc12-c++-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-c++-12.3.0+git1204-150000.1.18.1
* gcc12-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-locale-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-12.3.0+git1204-150000.1.18.1
* cpp12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Enterprise Storage 7.1 (noarch)
* gcc12-info-12.3.0+git1204-150000.1.18.1
* SUSE Enterprise Storage 7.1 (x86_64)
* cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* gcc12-fortran-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-32bit-12.3.0+git1204-150000.1.18.1
* libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.18.1
* gcc12-c++-32bit-12.3.0+git1204-150000.1.18.1
* cross-nvptx-gcc12-12.3.0+git1204-150000.1.18.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gcc12-debugsource-12.3.0+git1204-150000.1.18.1
* gcc12-debuginfo-12.3.0+git1204-150000.1.18.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1209055
* https://jira.suse.com/browse/MSC-766
1
0
SUSE-SU-2024:1390-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1390-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_36 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1387=1 SUSE-2024-1390=1 SUSE-2024-1389=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1389=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1387=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2024-1390=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_2-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_5-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_12-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-10-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_2-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_5-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_12-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-10-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1388-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1388-1
Rating: important
References:
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_44 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1388=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1388=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-5-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-5-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1391-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
by OPENSUSE-UPDATES 23 Apr '24
by OPENSUSE-UPDATES 23 Apr '24
23 Apr '24
# Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1391-1
Rating: important
References:
* bsc#1220828
Cross-References:
* CVE-2024-26622
CVSS scores:
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_150 fixes one issue.
The following security issue was fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1391=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1391=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-5-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_41-debugsource-5-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-preempt-5-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_150-default-5-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1380-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1380-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_7 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1381=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1380=1 SUSE-2024-1385=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1380=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1385=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1381=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_1-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-10-150500.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_16-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-6-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_16-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-6-150400.2.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_1-debugsource-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-10-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-10-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1386-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1386-1
Rating: important
References:
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_103 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1386=1 SUSE-2024-1384=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1386=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1384=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-4-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-4-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-4-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
# Security update for glibc
Announcement ID: SUSE-SU-2024:1375-1
Rating: important
References:
* bsc#1222992
Cross-References:
* CVE-2024-2961
CVSS scores:
* CVE-2024-2961 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for glibc fixes the following issues:
* iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence
(CVE-2024-2961, bsc#1222992)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1375=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1375=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1375=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1375=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1375=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1375=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1375=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1375=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1375=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1375=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1375=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1375=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1375=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1375=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1375=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1375=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1375=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1375=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1375=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1375=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1375=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1375=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-devel-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* glibc-extra-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* openSUSE Leap 15.3 (noarch)
* glibc-lang-2.31-150300.74.1
* glibc-html-2.31-150300.74.1
* glibc-info-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* openSUSE Leap 15.3 (x86_64)
* glibc-utils-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-profile-32bit-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-static-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-utils-32bit-debuginfo-2.31-150300.74.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* glibc-utils-64bit-debuginfo-2.31-150300.74.1
* glibc-devel-64bit-2.31-150300.74.1
* glibc-utils-64bit-2.31-150300.74.1
* glibc-locale-base-64bit-2.31-150300.74.1
* glibc-devel-static-64bit-2.31-150300.74.1
* glibc-64bit-debuginfo-2.31-150300.74.1
* glibc-profile-64bit-2.31-150300.74.1
* glibc-devel-64bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-64bit-debuginfo-2.31-150300.74.1
* glibc-64bit-2.31-150300.74.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* openSUSE Leap 15.5 (x86_64)
* glibc-utils-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-profile-32bit-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-static-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-utils-32bit-debuginfo-2.31-150300.74.1
* openSUSE Leap 15.5 (noarch)
* glibc-lang-2.31-150300.74.1
* glibc-html-2.31-150300.74.1
* glibc-info-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* Basesystem Module 15-SP5 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* Basesystem Module 15-SP5 (x86_64)
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* Development Tools Module 15-SP5 (x86_64)
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Manager Proxy 4.3 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Proxy 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* SUSE Manager Server 4.3 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Manager Server 4.3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-debuginfo-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-extra-2.31-150300.74.1
* glibc-profile-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-extra-debuginfo-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-utils-debuginfo-2.31-150300.74.1
* nscd-debuginfo-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-devel-debuginfo-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-devel-static-2.31-150300.74.1
* glibc-utils-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* nscd-2.31-150300.74.1
* glibc-utils-src-debugsource-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (noarch)
* glibc-info-2.31-150300.74.1
* glibc-lang-2.31-150300.74.1
* glibc-i18ndata-2.31-150300.74.1
* SUSE Enterprise Storage 7.1 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.74.1
* glibc-devel-32bit-debuginfo-2.31-150300.74.1
* glibc-32bit-2.31-150300.74.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.74.1
* glibc-locale-base-32bit-2.31-150300.74.1
* glibc-devel-32bit-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* glibc-devel-2.31-150300.74.1
* glibc-debuginfo-2.31-150300.74.1
* glibc-2.31-150300.74.1
* glibc-locale-2.31-150300.74.1
* glibc-debugsource-2.31-150300.74.1
* glibc-locale-base-debuginfo-2.31-150300.74.1
* glibc-locale-base-2.31-150300.74.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2961.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222992
1
0
# Security update for polkit
Announcement ID: SUSE-SU-2024:1376-1
Rating: low
References:
* bsc#1209282
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one security fix can now be installed.
## Description:
This update for polkit fixes the following issues:
* Change permissions for rules folders (bsc#1209282)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1376=1 openSUSE-SLE-15.5-2024-1376=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1376=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1376=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* polkit-devel-121-150500.3.3.1
* pkexec-debuginfo-121-150500.3.3.1
* typelib-1_0-Polkit-1_0-121-150500.3.3.1
* polkit-devel-debuginfo-121-150500.3.3.1
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* pkexec-121-150500.3.3.1
* openSUSE Leap 15.5 (x86_64)
* libpolkit-agent-1-0-32bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-32bit-121-150500.3.3.1
* libpolkit-gobject-1-0-32bit-121-150500.3.3.1
* libpolkit-gobject-1-0-32bit-debuginfo-121-150500.3.3.1
* openSUSE Leap 15.5 (noarch)
* polkit-doc-121-150500.3.3.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpolkit-gobject-1-0-64bit-121-150500.3.3.1
* libpolkit-gobject-1-0-64bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-64bit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-64bit-121-150500.3.3.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* polkit-devel-121-150500.3.3.1
* pkexec-debuginfo-121-150500.3.3.1
* typelib-1_0-Polkit-1_0-121-150500.3.3.1
* polkit-devel-debuginfo-121-150500.3.3.1
* polkit-121-150500.3.3.1
* polkit-debugsource-121-150500.3.3.1
* polkit-debuginfo-121-150500.3.3.1
* libpolkit-agent-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-debuginfo-121-150500.3.3.1
* libpolkit-gobject-1-0-121-150500.3.3.1
* libpolkit-agent-1-0-121-150500.3.3.1
* pkexec-121-150500.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1209282
1
0
SUSE-SU-2024:1377-1: moderate: Security update for apache-commons-configuration
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for apache-commons-configuration
Announcement ID: SUSE-SU-2024:1377-1
Rating: moderate
References:
* bsc#1221793
* bsc#1221797
Cross-References:
* CVE-2024-29131
* CVE-2024-29133
CVSS scores:
* CVE-2024-29131 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-29133 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for apache-commons-configuration fixes the following issues:
* CVE-2024-29131: Fixed StackOverflowError adding property in
AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
* CVE-2024-29133: Fixed StackOverflowError calling
ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
(bsc#1221793).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1377=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1377=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* apache-commons-configuration-javadoc-1.10-150200.3.11.1
* apache-commons-configuration-1.10-150200.3.11.1
* Development Tools Module 15-SP5 (noarch)
* apache-commons-configuration-1.10-150200.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2024-29131.html
* https://www.suse.com/security/cve/CVE-2024-29133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221793
* https://bugzilla.suse.com/show_bug.cgi?id=1221797
1
0
SUSE-SU-2024:1365-1: moderate: Security update for apache-commons-configuration2
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for apache-commons-configuration2
Announcement ID: SUSE-SU-2024:1365-1
Rating: moderate
References:
* bsc#1221793
* bsc#1221797
Cross-References:
* CVE-2024-29131
* CVE-2024-29133
CVSS scores:
* CVE-2024-29131 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-29133 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for apache-commons-configuration2 fixes the following issues:
* CVE-2024-29131: Fixed StackOverflowError adding property in
AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
* CVE-2024-29133: Fixed StackOverflowError calling
ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
(bsc#1221793).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1365=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1365=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1365=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1365=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1365=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1365=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1365=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* apache-commons-configuration2-javadoc-2.10.1-150200.5.8.1
* Development Tools Module 15-SP5 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
* SUSE Enterprise Storage 7.1 (noarch)
* apache-commons-configuration2-2.10.1-150200.5.8.1
## References:
* https://www.suse.com/security/cve/CVE-2024-29131.html
* https://www.suse.com/security/cve/CVE-2024-29133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221793
* https://bugzilla.suse.com/show_bug.cgi?id=1221797
1
0
22 Apr '24
# Recommended update for openssh
Announcement ID: SUSE-RU-2024:1366-1
Rating: moderate
References:
* bsc#1216474
* bsc#1218871
* bsc#1221123
* bsc#1222831
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has four fixes can now be installed.
## Description:
This update for openssh fixes the following issues:
* Fix hostbased ssh login failing occasionally with "signature unverified:
incorrect signature" by fixing a typo in patch (bsc#1221123)
* Avoid closing IBM Z crypto devices nodes. (bsc#1218871)
* Allow usage of IBM Z crypto adapter cards in seccomp filters (bsc#1216474)
* Change the default value of UpdateHostKeys to Yes (unless VerifyHostKeyDNS
is enabled).
This makes ssh update the known_hosts stored keys with all published versions by
the server (after it's authenticated with an existing key), which will allow to
identify the server with a different key if the existing key is considered
insecure at some point in the future (bsc#1222831).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1366=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1366=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1366=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1366=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1366=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1366=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1366=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1366=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1366=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1366=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1366=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1366=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1366=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1366=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1366=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1366=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1366=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1366=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1366=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1366=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1366=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1366=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1366=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1366=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1366=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1366=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-cavs-8.4p1-150300.3.37.1
* openssh-cavs-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-cavs-8.4p1-150300.3.37.1
* openssh-cavs-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Manager Proxy 4.3 (x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-debuginfo-8.4p1-150300.3.37.1
* openssh-helpers-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-askpass-gnome-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* openssh-common-debuginfo-8.4p1-150300.3.37.1
* openssh-clients-8.4p1-150300.3.37.1
* openssh-debugsource-8.4p1-150300.3.37.1
* openssh-fips-8.4p1-150300.3.37.1
* openssh-clients-debuginfo-8.4p1-150300.3.37.1
* openssh-common-8.4p1-150300.3.37.1
* openssh-server-debuginfo-8.4p1-150300.3.37.1
* openssh-8.4p1-150300.3.37.1
* openssh-debuginfo-8.4p1-150300.3.37.1
* openssh-server-8.4p1-150300.3.37.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1216474
* https://bugzilla.suse.com/show_bug.cgi?id=1218871
* https://bugzilla.suse.com/show_bug.cgi?id=1221123
* https://bugzilla.suse.com/show_bug.cgi?id=1222831
1
0
# Security update for shim
Announcement ID: SUSE-SU-2024:1368-1
Rating: important
References:
* bsc#1198101
* bsc#1205588
* bsc#1205855
* bsc#1210382
* bsc#1213945
* bsc#1215098
* bsc#1215099
* bsc#1215100
* bsc#1215101
* bsc#1215102
* bsc#1215103
* bsc#1219460
* jsc#PED-922
Cross-References:
* CVE-2022-28737
* CVE-2023-40546
* CVE-2023-40547
* CVE-2023-40548
* CVE-2023-40549
* CVE-2023-40550
* CVE-2023-40551
CVSS scores:
* CVE-2022-28737 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28737 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-40546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40547 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-40548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-40549 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40550 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-40551 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves seven vulnerabilities, contains one feature and has five
security fixes can now be installed.
## Description:
This update for shim fixes the following issues:
* Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
* Limit the requirement of fde-tpm-helper-macros to the distro with
suse_version 1600 and above (bsc#1219460)
Update to version 15.8:
Security issues fixed:
* mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
* avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
* Fix integer overflow on SBAT section size on 32-bit system
(bsc#1215100,CVE-2023-40548)
* Authenticode: verify that the signature header is in bounds
(bsc#1215101,CVE-2023-40549)
* pe: Fix an out-of-bound read in verify_buffer_sbat()
(bsc#1215102,CVE-2023-40550)
* pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)
The NX flag is disable which is same as the default value of shim-15.8, hence,
not need to enable it by this patch now.
* Generate dbx during build so we don't include binary files in sources
* Don't require grub so shim can still be used with systemd-boot
* Update shim-install to fix boot failure of ext4 root file system on RAID10
(bsc#1205855)
* Adopt the macros from fde-tpm-helper-macros to update the signature in the
sealed key after a bootloader upgrade
* Update shim-install to amend full disk encryption support
* Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
* Use the long name to specify the grub2 key protector
* cryptodisk: support TPM authorized policies
* Do not use tpm_record_pcrs unless the command is in command.lst
* Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
enable the NX compatibility flag when using post-process-pe after discussed
with grub2 experts in mail. It's useful for further development and testing.
(bsc#1205588)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1368=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1368=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1368=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1368=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1368=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1368=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1368=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1368=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1368=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1368=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1368=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1368=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1368=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1368=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1368=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1368=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1368=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1368=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1368=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1368=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1368=1
## Package List:
* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* efitools-debugsource-1.9.2-150300.7.3.1
* efitools-debuginfo-1.9.2-150300.7.3.1
* efitools-1.9.2-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* openSUSE Leap 15.5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* Basesystem Module 15-SP5 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Proxy 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Manager Server 4.3 (x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* shim-debugsource-15.8-150300.4.20.2
* shim-debuginfo-15.8-150300.4.20.2
* shim-15.8-150300.4.20.2
## References:
* https://www.suse.com/security/cve/CVE-2022-28737.html
* https://www.suse.com/security/cve/CVE-2023-40546.html
* https://www.suse.com/security/cve/CVE-2023-40547.html
* https://www.suse.com/security/cve/CVE-2023-40548.html
* https://www.suse.com/security/cve/CVE-2023-40549.html
* https://www.suse.com/security/cve/CVE-2023-40550.html
* https://www.suse.com/security/cve/CVE-2023-40551.html
* https://bugzilla.suse.com/show_bug.cgi?id=1198101
* https://bugzilla.suse.com/show_bug.cgi?id=1205588
* https://bugzilla.suse.com/show_bug.cgi?id=1205855
* https://bugzilla.suse.com/show_bug.cgi?id=1210382
* https://bugzilla.suse.com/show_bug.cgi?id=1213945
* https://bugzilla.suse.com/show_bug.cgi?id=1215098
* https://bugzilla.suse.com/show_bug.cgi?id=1215099
* https://bugzilla.suse.com/show_bug.cgi?id=1215100
* https://bugzilla.suse.com/show_bug.cgi?id=1215101
* https://bugzilla.suse.com/show_bug.cgi?id=1215102
* https://bugzilla.suse.com/show_bug.cgi?id=1215103
* https://bugzilla.suse.com/show_bug.cgi?id=1219460
* https://jira.suse.com/browse/PED-922
1
0
22 Apr '24
# Recommended update for autofs
Announcement ID: SUSE-RU-2024:1370-1
Rating: moderate
References:
* bsc#1214710
* bsc#1221181
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for autofs fixes the following issue:
* Don't use initgroups at spawn (bsc#1214710, bsc#1221181)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1370=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1370=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1370=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1370=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1370=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1370=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1370=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1370=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1370=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1370=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1370=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1370=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1370=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1370=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1370=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1370=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1370=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Manager Proxy 4.3 (x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* autofs-debuginfo-5.1.3-150000.7.17.2
* autofs-debugsource-5.1.3-150000.7.17.2
* autofs-5.1.3-150000.7.17.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214710
* https://bugzilla.suse.com/show_bug.cgi?id=1221181
1
0
22 Apr '24
# Recommended update for python-kiwi
Announcement ID: SUSE-RU-2024:1371-1
Rating: moderate
References:
* bsc#1207128
* bsc#1213595
* bsc#1219074
* bsc#1221915
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for python-kiwi fixes the following issues:
* Fixed Live ISO image (bsc#1213595): Make sure to wait for the event queue to
become empty after the creation of the write partition. When kiwi calls the
code to create the write partition this emits new udev events. It's
important to wait for the event queue to become empty to avoid a potential
regression on the use of the device nodes. In the processing of the events
it can happen that a device gets removed and re-added. If we don't want for
udev to process the entire queue it can happen that the wrong block device
is used. This wrong selection is only possible because the way how hybrid
ISOs are designed exposes both, the disk and the partition for the root
device with the same label.
* Set the default output console to gfxterm for grub (bsc#1219074): If no
console setting is done in the image description for grub the default output
console is set to: gfxterm and the default input console is set to: console.
* Use rsync defaults to sync the initrd root-tree (bsc#1207128, bsc#1221915)
This fix makes use of rsync default options to sync the root-tree of the
boot image for custom initrds.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1371=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1371=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1371=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1371=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1371=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1371=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1371=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1371=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1371=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1371=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1371=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1371=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* dracut-kiwi-overlay-9.24.43-150100.3.76.1
* kiwi-man-pages-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.76.1
* kiwi-systemdeps-core-9.24.43-150100.3.76.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.76.1
* python3-kiwi-9.24.43-150100.3.76.1
* kiwi-tools-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* kiwi-systemdeps-9.24.43-150100.3.76.1
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.76.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.76.1
* kiwi-systemdeps-containers-9.24.43-150100.3.76.1
* kiwi-tools-debuginfo-9.24.43-150100.3.76.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.76.1
* dracut-kiwi-live-9.24.43-150100.3.76.1
* openSUSE Leap 15.5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* dracut-kiwi-overlay-9.24.43-150100.3.76.1
* kiwi-man-pages-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.76.1
* kiwi-systemdeps-core-9.24.43-150100.3.76.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.76.1
* python3-kiwi-9.24.43-150100.3.76.1
* kiwi-tools-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* kiwi-systemdeps-9.24.43-150100.3.76.1
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.76.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.76.1
* kiwi-systemdeps-containers-9.24.43-150100.3.76.1
* kiwi-tools-debuginfo-9.24.43-150100.3.76.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.76.1
* dracut-kiwi-live-9.24.43-150100.3.76.1
* Development Tools Module 15-SP5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-oem-dump-9.24.43-150100.3.76.1
* python-kiwi-debugsource-9.24.43-150100.3.76.1
* dracut-kiwi-lib-9.24.43-150100.3.76.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.76.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1207128
* https://bugzilla.suse.com/show_bug.cgi?id=1213595
* https://bugzilla.suse.com/show_bug.cgi?id=1219074
* https://bugzilla.suse.com/show_bug.cgi?id=1221915
1
0
SUSE-SU-2024:1358-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1358-1
Rating: important
References:
* bsc#1216644
* bsc#1219079
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-0775
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_5 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c
that could allow a local user to cause an information leak problem while
freeing the old quota file names before a potential failure (bsc#1219079).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1356=1 SUSE-2024-1358=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1356=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1358=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-11-150500.12.1
* kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-10-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-11-150500.12.1
* kernel-livepatch-5_14_21-150500_11-rt-11-150500.12.1
* kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_13_5-rt-10-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-11-150500.12.1
* kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-10-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-11-150500.12.1
* kernel-livepatch-5_14_21-150500_11-rt-11-150500.12.1
* kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-10-150500.2.1
* kernel-livepatch-5_14_21-150500_13_5-rt-10-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-0775.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219079
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1359-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1359-1
Rating: important
References:
* bsc#1216644
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2023-5717
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2023-5717 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5717 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_24 fixes several issues.
The following security issues were fixed:
* CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the
Performance Events component (bsc#1216644).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1361=1 SUSE-2024-1359=1 SUSE-2024-1357=1
SUSE-2024-1360=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1361=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1359=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2024-1357=1 SUSE-SLE-Module-Live-Patching-15-SP5-2024-1360=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_18-rt-8-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-9-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_18-rt-8-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-9-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-7-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5717.html
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216644
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1362-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1362-1
Rating: important
References:
* bsc#1219296
* bsc#1220828
Cross-References:
* CVE-2023-52340
* CVE-2024-26622
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_35 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1362=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1362=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-3-150500.11.8.1
* kernel-livepatch-5_14_21-150500_13_35-rt-3-150500.11.8.1
* kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-3-150500.11.8.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-3-150500.11.8.1
* kernel-livepatch-5_14_21-150500_13_35-rt-3-150500.11.8.1
* kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-3-150500.11.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
SUSE-SU-2024:1364-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)
by OPENSUSE-UPDATES 22 Apr '24
by OPENSUSE-UPDATES 22 Apr '24
22 Apr '24
# Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1364-1
Rating: important
References:
* bsc#1219435
* bsc#1220828
Cross-References:
* CVE-2024-1086
* CVE-2024-26622
CVSS scores:
* CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_30 fixes several issues.
The following security issues were fixed:
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables
component that could have been exploited to achieve local privilege
escalation (bsc#1219435).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1364=1 SUSE-2024-1363=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1364=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1363=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-5-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-5-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1086.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219435
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
1
0
openSUSE-SU-2024:0112-1: moderate: Security update for perl-CryptX
by opensuse-security@opensuse.org 20 Apr '24
by opensuse-security@opensuse.org 20 Apr '24
20 Apr '24
openSUSE Security Update: Security update for perl-CryptX
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0112-1
Rating: moderate
References: #1221528
Cross-References: CVE-2018-25099
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for perl-CryptX fixes the following issues:
Updated to version 0.080:
0.080 2023-10-04
- fix #95 AES-NI troubles on MS Windows (gcc compiler)
- fix #96 Tests failure with Math::BigInt >= 1.999840
- Enabled AES-NI for platforms with gcc/clang/llvm 0.079
2023-10-01
- fix #92 update libtomcrypt
- bundled libtomcrypt update branch:develop (commit:1e629e6f
2023-06-22) 0.078 2023-04-28
- fix #89 Crypt::Mac::HMAC b64mac and b64umac object methods do
not work
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-112=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
perl-CryptX-0.80.0-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-25099.html
https://bugzilla.suse.com/1221528
1
0
19 Apr '24
# Recommended update for cloud-init
Announcement ID: SUSE-RU-2024:1352-1
Rating: important
References:
* bsc#1220132
* bsc#1221132
* bsc#1221726
* bsc#1222113
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has four fixes can now be installed.
## Description:
This update for cloud-init contains the following fixes:
* Add cloud-init-no-nmcfg-needed.patch (bsc#1221726)
* Do not require a NetworkManager config file in order to detect
NetworkManager as the renderer
* Add cloud-init-no-openstack-guess.patch (bsc#1222113)
* Do not guess if we are running on OpenStack or not. Only recognize the known
markers and enable cloud-init if we know for sure.
* Do not guess a data source when checking for a CloudStack environment.
(bsc#1221132)
* Hardcode distribution to suse for proper cloud.cfg generation (bsc#1220132).
* Prepare for RPM 4.20 switch patch syntax
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1352=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1352=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1352=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1352=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1352=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1352=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-doc-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cloud-init-config-suse-23.3-150100.8.79.2
* cloud-init-23.3-150100.8.79.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220132
* https://bugzilla.suse.com/show_bug.cgi?id=1221132
* https://bugzilla.suse.com/show_bug.cgi?id=1221726
* https://bugzilla.suse.com/show_bug.cgi?id=1222113
1
0
openSUSE-SU-2024:0111-1: important: Security update for putty
by opensuse-security@opensuse.org 19 Apr '24
by opensuse-security@opensuse.org 19 Apr '24
19 Apr '24
openSUSE Security Update: Security update for putty
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0111-1
Rating: important
References:
Cross-References: CVE-2024-31497
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for putty fixes the following issues:
Update to release 0.81
* Fix CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no
longer generated with biased values of k. The previous bias compromises
private keys.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-111=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
putty-0.81-bp155.2.6.1
References:
https://www.suse.com/security/cve/CVE-2024-31497.html
1
0
19 Apr '24
# Security update for wireshark
Announcement ID: SUSE-SU-2024:1347-1
Rating: important
References:
* bsc#1220181
Cross-References:
* CVE-2024-24476
CVSS scores:
* CVE-2024-24476 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for wireshark fixes the following issues:
Security fixes:
* CVE-2024-24476: Fixed a denial of service in ws_manuf_lookup_str()
(bsc#1220181)
Other fixes:
* Wireshark 3.6.22:
* Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.22.html
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1347=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1347=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1347=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1347=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1347=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1347=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1347=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1347=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1347=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1347=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1347=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Proxy 4.3 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* wireshark-debugsource-3.6.22-150000.3.112.1
* libwiretap12-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-3.6.22-150000.3.112.1
* wireshark-debuginfo-3.6.22-150000.3.112.1
* libwsutil13-3.6.22-150000.3.112.1
* wireshark-devel-3.6.22-150000.3.112.1
* libwireshark15-3.6.22-150000.3.112.1
* libwireshark15-debuginfo-3.6.22-150000.3.112.1
* wireshark-ui-qt-debuginfo-3.6.22-150000.3.112.1
* wireshark-3.6.22-150000.3.112.1
* libwsutil13-debuginfo-3.6.22-150000.3.112.1
* libwiretap12-3.6.22-150000.3.112.1
## References:
* https://www.suse.com/security/cve/CVE-2024-24476.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220181
1
0
SUSE-RU-2024:1348-1: moderate: Recommended update for google-cloud-sap-agent
by OPENSUSE-UPDATES 19 Apr '24
by OPENSUSE-UPDATES 19 Apr '24
19 Apr '24
# Recommended update for google-cloud-sap-agent
Announcement ID: SUSE-RU-2024:1348-1
Rating: moderate
References:
* bsc#1222215
* bsc#1222216
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for google-cloud-sap-agent fixes the following issues:
* Update to version 3.2 (bsc#1222215, bsc#1222216)
* Remove internal gensupport package
* Restore additional error handling and response checking to internal data
warehouse client
* Updating the aggregate function in HANA insight rules
* Remove a leftover debug log
* Allow multipart uploads for PIPE file types
* Update go-hdb version to v1.8.0
* Perform log restores in serial rather than parallel
* Add sample usage examples to commandlineexecutor
* Small update to configureinstance OTE
* Add nil check in backup and restore flows to protect against panics
* Close http response body in WriteInsight() and soap.go
* Record topology type
* Initialize usagemetrics for OTEs
* Add Instance Number to SAP System instance properties
* Set `min_version` for WLM `os_settings` system metric
* Increase timeout for saptune re-apply commands
* Adding handling for encrypted snapshots in backup and restore
* Change the version check comparisons to account for versions older than
those listed in SAP Note
* Skip the Netweaver metrics that need dpmon on NW kernels affected by SAP
Note: 3366597
* Fix imports
* No public description
* Use internal data warehouse client
* Fix disp+work command invocation for Netweaver Kernel version discovery
* Add note about default parameter values to installbackint
* Add mutex in multipart writer for potential data races
* Update go.mod and go.sum
* Skip XFS freeze by default unless user passes a parameter to do it
explicitly
* configureinstance minor updates.
* Add safety check for usage metrics on BMS
* Storage Class parameter added to Backint
* Update configureinstance's X4 saptune conf
* XML Multipart Write() and Close() methods completed
* Fixes the vmmanager policies for sles12 and sles15 used in the cloud console
removes the individual cloud console policies and consolidates them into one
Adds a general gcloud command line policy
* Standardize logging for workloadmanager package
* Multipart XML API Uploads for Backint
* Add database system SID to database properties
* Fix NW HA node identification for RedHat deployments
* Add workload properties to discovery object returned by discoverSAPSystems
* Add ASCS instance number to application data
* Add Workload Manager validation rule for checking OS settings
* Enable WLM metric collection by default, disable submission of data to Cloud
Monitoring
* Decoupling primary executable command and providing an alternative to lsof
* Added HANA version in support bundle collection
* Add WorkloadProperties to merged system details and to WLM Insights
* Replace the link placeholder with the actual link
* Add instance number to SAP discovery data
* Tranche 12: HRE Rules
* Minor typo fix in workloadmanager's hana metrics module
* Add pacemaker metrics with SID labels to process metrics
* updating the regex for backup and backint files to take care of log rotation
in support bundle
* Add support for disk snapshot labels for easy lifecycle management of
snapshots
* Added new OTE for changedisktype workflow
* Add WorkloadProperties to SapSystemDetails for apps_discovery
* Testing the timeseries in unit tests instead of just checking the count
* Record Netweaver kernel version.
* Tranche 12: HRE Rules
* Relocating pacemaker collection related packages to internal/pacemaker for
common use between process metrics and WLM
* Use results from latest round of discovery for the collection of process
metrics.
* Handling zero rows returned case better in HANA insights
* Adding docstrings to workloadmanager package
* Adding docstring to configure OTE
* adding docstrings to methods in support bundle
* Add X4 specific configurations to configureinstance OTE
* Add helper functions to configureinstance OTE
* Display updates for HANA Insights WLM rules rollout
* configureinstance OTE
* Removing the sap control process command line params
* Revert "Fixing system replication status code being returned"
* configureinstance OTE
* We expect the command to return a non-zero exit code and we should not be
returning an error. Execute treats non-zero exit code as error
* Removing the sap control process command line params
* Fixing system replication status code being returned
* Wait for hdbindex server to stop after HANA is stopped
* Log error to console in cases where LVM is not being used
* Adding JournalCTL logs to support bunddle
* hanadiskbckup - Add missing params to the Usage string
* Move usagemetrics package into shared folder
* Fixed data race error in TestCollectAndSendSlowMovingMetrics()
* Disk backup/restore - Enable send-metrics-to-monitoring by default
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1348=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1348=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1348=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1348=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1348=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.2-150100.3.29.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.2-150100.3.29.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.2-150100.3.29.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.2-150100.3.29.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.2-150100.3.29.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222215
* https://bugzilla.suse.com/show_bug.cgi?id=1222216
1
0
19 Apr '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:1350-1
Rating: important
References:
* bsc#1222535
Cross-References:
* CVE-2024-2609
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3854
* CVE-2024-3857
* CVE-2024-3859
* CVE-2024-3861
* CVE-2024-3863
* CVE-2024-3864
CVSS scores:
* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves nine vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 115.10.0 ESR (MSFA 2024-19)
(bsc#1222535):
* CVE-2024-3852: GetBoundName in the JIT returned the wrong object
* CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
* CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during
garbage collection
* CVE-2024-2609: Permission prompt input delay could expire when not in focus
* CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType
sanitizer
* CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
* CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on
Windows
* CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
* CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10,
and Thunderbird 115.10
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1350=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1350=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1350=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1350=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1350=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1350=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1350=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1350=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1350=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-branding-upstream-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-115.10.0-150200.152.134.1
* MozillaFirefox-translations-other-115.10.0-150200.152.134.1
* MozillaFirefox-translations-common-115.10.0-150200.152.134.1
* MozillaFirefox-debuginfo-115.10.0-150200.152.134.1
* MozillaFirefox-debugsource-115.10.0-150200.152.134.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.10.0-150200.152.134.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222535
1
0
# Security update for graphviz
Announcement ID: SUSE-SU-2024:1351-1
Rating: low
References:
* bsc#1219491
Cross-References:
* CVE-2023-46045
CVSS scores:
* CVE-2023-46045 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-46045 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for graphviz fixes the following issues:
* CVE-2023-46045: Fixed out-of-bounds read via a crafted config6a file
(bsc#1219491)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1351=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1351=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1351=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1351=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1351=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1351=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1351=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-1351=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python3-gv-2.48.0-150400.3.3.1
* graphviz-lua-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-debuginfo-2.48.0-150400.3.3.1
* graphviz-tcl-2.48.0-150400.3.3.1
* graphviz-php-debuginfo-2.48.0-150400.3.3.1
* graphviz-lua-debuginfo-2.48.0-150400.3.3.1
* libgraphviz6-2.48.0-150400.3.3.1
* graphviz-guile-2.48.0-150400.3.3.1
* graphviz-webp-debuginfo-2.48.0-150400.3.3.1
* graphviz-gnome-2.48.0-150400.3.3.1
* graphviz-tcl-debuginfo-2.48.0-150400.3.3.1
* graphviz-guile-debuginfo-2.48.0-150400.3.3.1
* graphviz-webp-2.48.0-150400.3.3.1
* graphviz-java-debuginfo-2.48.0-150400.3.3.1
* graphviz-perl-debuginfo-2.48.0-150400.3.3.1
* graphviz-gvedit-2.48.0-150400.3.3.1
* graphviz-java-2.48.0-150400.3.3.1
* graphviz-devel-2.48.0-150400.3.3.1
* graphviz-doc-2.48.0-150400.3.3.1
* graphviz-plugins-core-2.48.0-150400.3.3.1
* graphviz-x11-2.48.0-150400.3.3.1
* graphviz-debugsource-2.48.0-150400.3.3.1
* graphviz-gd-2.48.0-150400.3.3.1
* graphviz-2.48.0-150400.3.3.1
* graphviz-ruby-2.48.0-150400.3.3.1
* graphviz-smyrna-2.48.0-150400.3.3.1
* libgraphviz6-debuginfo-2.48.0-150400.3.3.1
* graphviz-debuginfo-2.48.0-150400.3.3.1
* graphviz-plugins-core-debuginfo-2.48.0-150400.3.3.1
* graphviz-php-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* graphviz-gvedit-debuginfo-2.48.0-150400.3.3.1
* graphviz-gnome-debuginfo-2.48.0-150400.3.3.1
* python3-gv-debuginfo-2.48.0-150400.3.3.1
* graphviz-x11-debuginfo-2.48.0-150400.3.3.1
* graphviz-smyrna-debuginfo-2.48.0-150400.3.3.1
* graphviz-perl-2.48.0-150400.3.3.1
* graphviz-ruby-debuginfo-2.48.0-150400.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-gv-2.48.0-150400.3.3.1
* graphviz-lua-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-debuginfo-2.48.0-150400.3.3.1
* graphviz-tcl-2.48.0-150400.3.3.1
* graphviz-php-debuginfo-2.48.0-150400.3.3.1
* graphviz-lua-debuginfo-2.48.0-150400.3.3.1
* libgraphviz6-2.48.0-150400.3.3.1
* graphviz-guile-2.48.0-150400.3.3.1
* graphviz-webp-debuginfo-2.48.0-150400.3.3.1
* graphviz-gnome-2.48.0-150400.3.3.1
* graphviz-tcl-debuginfo-2.48.0-150400.3.3.1
* graphviz-guile-debuginfo-2.48.0-150400.3.3.1
* graphviz-webp-2.48.0-150400.3.3.1
* graphviz-java-debuginfo-2.48.0-150400.3.3.1
* graphviz-perl-debuginfo-2.48.0-150400.3.3.1
* graphviz-gvedit-2.48.0-150400.3.3.1
* graphviz-java-2.48.0-150400.3.3.1
* graphviz-devel-2.48.0-150400.3.3.1
* graphviz-doc-2.48.0-150400.3.3.1
* graphviz-plugins-core-2.48.0-150400.3.3.1
* graphviz-x11-2.48.0-150400.3.3.1
* graphviz-debugsource-2.48.0-150400.3.3.1
* graphviz-gd-2.48.0-150400.3.3.1
* graphviz-2.48.0-150400.3.3.1
* graphviz-ruby-2.48.0-150400.3.3.1
* graphviz-smyrna-2.48.0-150400.3.3.1
* libgraphviz6-debuginfo-2.48.0-150400.3.3.1
* graphviz-debuginfo-2.48.0-150400.3.3.1
* graphviz-plugins-core-debuginfo-2.48.0-150400.3.3.1
* graphviz-php-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* graphviz-gvedit-debuginfo-2.48.0-150400.3.3.1
* graphviz-gnome-debuginfo-2.48.0-150400.3.3.1
* python3-gv-debuginfo-2.48.0-150400.3.3.1
* graphviz-x11-debuginfo-2.48.0-150400.3.3.1
* graphviz-smyrna-debuginfo-2.48.0-150400.3.3.1
* graphviz-perl-2.48.0-150400.3.3.1
* graphviz-ruby-debuginfo-2.48.0-150400.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libgraphviz6-debuginfo-2.48.0-150400.3.3.1
* graphviz-devel-2.48.0-150400.3.3.1
* graphviz-plugins-core-2.48.0-150400.3.3.1
* graphviz-debugsource-2.48.0-150400.3.3.1
* graphviz-debuginfo-2.48.0-150400.3.3.1
* graphviz-plugins-core-debuginfo-2.48.0-150400.3.3.1
* graphviz-2.48.0-150400.3.3.1
* libgraphviz6-2.48.0-150400.3.3.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* graphviz-perl-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-perl-debuginfo-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* graphviz-gnome-debuginfo-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-gnome-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-tcl-debuginfo-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* graphviz-tcl-2.48.0-150400.3.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* python3-gv-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-debuginfo-2.48.0-150400.3.3.1
* python3-gv-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* python3-gv-2.48.0-150400.3.3.1
* graphviz-addons-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-debuginfo-2.48.0-150400.3.3.1
* python3-gv-debuginfo-2.48.0-150400.3.3.1
* graphviz-gd-2.48.0-150400.3.3.1
* graphviz-addons-debugsource-2.48.0-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2023-46045.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219491
1
0
SUSE-RU-2024:1344-1: moderate: Recommended update for libzypp, zypper
by OPENSUSE-UPDATES 18 Apr '24
by OPENSUSE-UPDATES 18 Apr '24
18 Apr '24
# Recommended update for libzypp, zypper
Announcement ID: SUSE-RU-2024:1344-1
Rating: moderate
References:
* bsc#1175678
* bsc#1218171
* bsc#1221525
* bsc#1222086
* jsc#OBS-301
* jsc#PED-8014
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that contains two features and has four fixes can now be installed.
## Description:
This update for libzypp, zypper fixes the following issues:
* Fix creation of sibling cache dirs with too restrictive mode (bsc#1222398)
* Update RepoStatus fromCookieFile according to the files mtime (bsc#1222086)
* TmpFile: Don't call chmod if makeSibling failed
* Fixup New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301,
jsc#PED-8014)
* Add resolver option 'removeOrphaned' for distupgrade (bsc#1221525)
* New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301,
jsc#PED-8014)
* Add default stripe minimum
* Don't expose std::optional where YAST/PK explicitly use c++11.
* Digest: Avoid using the deprecated OPENSSL_config
* version 17.32.0
* ProblemSolution::skipsPatchesOnly overload to handout the patches
* Show active dry-run/download-only at the commit propmpt
* Add --skip-not-applicable-patches option
* Fix printing detailed solver problem description
* Fix bash-completion to work with right adjusted numbers in the 1st column
too
* Set libzypp shutdown request signal on Ctrl+C
* In the detailed view show all baseurls not just the first one (bsc#1218171)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1344=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1344=1 openSUSE-SLE-15.5-2024-1344=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1344=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1344=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1344=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1344=1 SUSE-SLE-
INSTALLER-15-SP4-2024-1344=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1344=1 SUSE-SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1344=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1344=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1344=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1344=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1344=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1344=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1344=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1344=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1344=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1344=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1344=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1344=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1344=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1344=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1344=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1344=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1344=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1344=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1344=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1344=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.15.4
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* perl-yui-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* python3-yui-debuginfo-4.3.7-150400.3.5.4
* PackageKit-backend-dnf-1.2.4-150400.3.15.4
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* python3-yui-4.3.7-150400.3.5.4
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libzypp-devel-doc-17.32.4-150400.3.61.1
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* ruby-yui-4.3.7-150400.3.5.4
* perl-yui-debuginfo-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* PackageKit-gtk3-module-1.2.4-150400.3.15.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* PackageKit-gstreamer-plugin-1.2.4-150400.3.15.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-bindings-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* libyui-bindings-debugsource-4.3.7-150400.3.5.4
* ruby-yui-debuginfo-4.3.7-150400.3.5.4
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.15.4
* libyui-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* openSUSE Leap 15.4 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-branding-upstream-1.2.4-150400.3.15.4
* zypper-aptitude-1.14.71-150400.3.45.2
* PackageKit-branding-SLE-12.0-150400.15.2.2
* zypper-log-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* openSUSE Leap 15.4 (x86_64)
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.15.4
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-devel-64bit-1.2.4-150400.3.15.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libyui-ncurses-rest-api16-4.5.3-150500.3.5.4
* libyui-bindings-debuginfo-4.5.3-150500.3.5.4
* libyui16-4.5.3-150500.3.5.4
* libyui-rest-api16-debuginfo-4.5.3-150500.3.5.4
* ruby-yui-4.5.3-150500.3.5.4
* libyui16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses16-4.5.3-150500.3.5.4
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.5.4
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.5.10
* libyui-qt-pkg-debugsource-4.5.3-150500.3.5.10
* libyui-qt-pkg-devel-4.5.3-150500.3.5.10
* python3-yui-4.5.3-150500.3.5.4
* libyui-ncurses-devel-4.5.3-150500.3.5.4
* libyui-qt-devel-4.5.3-150500.3.5.4
* libyui-debugsource-4.5.3-150500.3.5.4
* libyui-rest-api-debugsource-4.5.3-150500.3.5.4
* libyui-devel-4.5.3-150500.3.5.4
* libyui-bindings-debugsource-4.5.3-150500.3.5.4
* libyui-ncurses-pkg-devel-4.5.3-150500.3.5.11
* python3-yui-debuginfo-4.5.3-150500.3.5.4
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.5.4
* libyui-rest-api-devel-4.5.3-150500.3.5.4
* libyui-qt-rest-api-devel-4.5.3-150500.3.5.4
* libyui-ncurses-tools-4.5.3-150500.3.5.4
* libyui-rest-api16-4.5.3-150500.3.5.4
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.5.11
* libyui-qt-graph-debugsource-4.5.3-150500.3.5.4
* libyui-ncurses-debugsource-4.5.3-150500.3.5.4
* perl-yui-4.5.3-150500.3.5.4
* perl-yui-debuginfo-4.5.3-150500.3.5.4
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.5.11
* libyui-qt16-4.5.3-150500.3.5.4
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.5.4
* libyui-qt-debugsource-4.5.3-150500.3.5.4
* libyui-qt-rest-api16-4.5.3-150500.3.5.4
* libyui-qt-graph-devel-4.5.3-150500.3.5.4
* libyui-qt16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.5.11
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* libyui-qt-graph16-4.5.3-150500.3.5.4
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* ruby-yui-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.5.4
* libyui-ncurses16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.5.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.15.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* PackageKit-backend-dnf-1.2.4-150400.3.15.4
* libzypp-devel-17.32.4-150400.3.61.1
* libzypp-devel-doc-17.32.4-150400.3.61.1
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* PackageKit-debugsource-1.2.4-150400.3.15.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* PackageKit-1.2.4-150400.3.15.4
* PackageKit-gtk3-module-1.2.4-150400.3.15.4
* PackageKit-gstreamer-plugin-1.2.4-150400.3.15.4
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.15.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* PackageKit-devel-1.2.4-150400.3.15.4
* openSUSE Leap 15.5 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-branding-upstream-1.2.4-150400.3.15.4
* zypper-aptitude-1.14.71-150400.3.45.2
* PackageKit-branding-SLE-12.0-150400.15.2.2
* zypper-log-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* openSUSE Leap 15.5 (x86_64)
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.15.4
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* openSUSE Leap Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* openSUSE Leap Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libyui-ncurses16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libyui-ncurses16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* SUSE Manager Server 4.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* zypper-log-1.14.71-150400.3.45.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* zypper-log-1.14.71-150400.3.45.2
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libyui-ncurses16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* SUSE Manager Retail Branch Server 4.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* zypper-log-1.14.71-150400.3.45.2
* SUSE Manager Proxy 4.3 (x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libyui-qt16-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* SUSE Manager Proxy 4.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* zypper-log-1.14.71-150400.3.45.2
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* zypper-debugsource-1.14.71-150400.3.45.2
* zypper-debuginfo-1.14.71-150400.3.45.2
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libzypp-17.32.4-150400.3.61.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui16-4.5.3-150500.3.5.4
* libyui-ncurses16-4.5.3-150500.3.5.4
* libyui16-debuginfo-4.5.3-150500.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-ncurses-pkg16-4.5.3-150500.3.5.11
* libyui-qt-devel-4.5.3-150500.3.5.4
* libyui-ncurses-devel-4.5.3-150500.3.5.4
* libyui-debugsource-4.5.3-150500.3.5.4
* libyui-devel-4.5.3-150500.3.5.4
* libyui-ncurses-pkg-devel-4.5.3-150500.3.5.11
* zypper-1.14.71-150400.3.45.2
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-tools-4.5.3-150500.3.5.4
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.5.11
* libyui-qt-graph-debugsource-4.5.3-150500.3.5.4
* libyui-ncurses-debugsource-4.5.3-150500.3.5.4
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.5.11
* libyui-qt16-4.5.3-150500.3.5.4
* libyui-qt-debugsource-4.5.3-150500.3.5.4
* libyui-qt-graph-devel-4.5.3-150500.3.5.4
* libyui-qt16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.5.11
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.5.11
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-qt-graph16-4.5.3-150500.3.5.4
* yast2-pkg-bindings-4.5.3-150500.3.5.11
* zypper-debuginfo-1.14.71-150400.3.45.2
* libyui-ncurses16-debuginfo-4.5.3-150500.3.5.4
* Basesystem Module 15-SP5 (noarch)
* zypper-needs-restarting-1.14.71-150400.3.45.2
* zypper-log-1.14.71-150400.3.45.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* libyui-qt-pkg16-4.5.3-150500.3.5.10
* PackageKit-devel-1.2.4-150400.3.15.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* PackageKit-1.2.4-150400.3.15.4
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.5.10
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt-pkg-devel-4.5.3-150500.3.5.10
* libyui-qt-pkg-debugsource-4.5.3-150500.3.5.10
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* Desktop Applications Module 15-SP5 (noarch)
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-rest-api-devel-4.5.3-150500.3.5.4
* libyui-qt-rest-api-devel-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api16-4.5.3-150500.3.5.4
* libyui-rest-api-debugsource-4.5.3-150500.3.5.4
* libyui-rest-api16-4.5.3-150500.3.5.4
* libyui-qt-rest-api16-4.5.3-150500.3.5.4
* libyui-rest-api16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.5.4
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.5.4
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.5.4
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.5.4
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-bindings-debuginfo-4.5.3-150500.3.5.4
* libyui-bindings-debugsource-4.5.3-150500.3.5.4
* ruby-yui-debuginfo-4.5.3-150500.3.5.4
* perl-yui-4.5.3-150500.3.5.4
* ruby-yui-4.5.3-150500.3.5.4
* perl-yui-debuginfo-4.5.3-150500.3.5.4
* python3-yui-debuginfo-4.5.3-150500.3.5.4
* python3-yui-4.5.3-150500.3.5.4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* zypper-log-1.14.71-150400.3.45.2
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* zypper-log-1.14.71-150400.3.45.2
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.15.4
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* PackageKit-gtk3-module-1.2.4-150400.3.15.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* PackageKit-gstreamer-plugin-1.2.4-150400.3.15.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.15.4
* libyui-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* zypper-log-1.14.71-150400.3.45.2
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.5.4
* libzypp-debuginfo-17.32.4-150400.3.61.1
* libyui-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.5.4
* libyui-qt-graph16-4.3.7-150400.3.5.4
* libzypp-17.32.4-150400.3.61.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.5.4
* libzypp-devel-17.32.4-150400.3.61.1
* libyui-qt-graph-devel-4.3.7-150400.3.5.4
* libyui-qt-rest-api-devel-4.3.7-150400.3.5.4
* libyui16-debuginfo-4.3.7-150400.3.5.4
* libyui16-4.3.7-150400.3.5.4
* libpackagekit-glib2-18-1.2.4-150400.3.15.4
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.15.4
* zypper-1.14.71-150400.3.45.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-4.3.7-150400.3.5.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
* libzypp-debugsource-17.32.4-150400.3.61.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.5.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-devel-debuginfo-1.2.4-150400.3.15.4
* libyui-ncurses-pkg-devel-4.3.7-150400.3.5.4
* yast2-pkg-bindings-4.4.7-150400.3.11.4
* libpackagekit-glib2-devel-1.2.4-150400.3.15.4
* PackageKit-backend-zypp-1.2.4-150400.3.15.4
* libyui-ncurses-rest-api16-4.3.7-150400.3.5.4
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.5.4
* libyui-qt-rest-api16-4.3.7-150400.3.5.4
* libyui-qt16-4.3.7-150400.3.5.4
* PackageKit-1.2.4-150400.3.15.4
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.11.4
* libyui-ncurses-tools-4.3.7-150400.3.5.4
* libyui-qt-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-4.3.7-150400.3.5.4
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.5.4
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.5.4
* libyui-ncurses-devel-4.3.7-150400.3.5.4
* libyui-ncurses16-4.3.7-150400.3.5.4
* libyui-ncurses-debugsource-4.3.7-150400.3.5.4
* libyui-qt-debugsource-4.3.7-150400.3.5.4
* zypper-debugsource-1.14.71-150400.3.45.2
* libyui-debugsource-4.3.7-150400.3.5.4
* zypper-debuginfo-1.14.71-150400.3.45.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.11.4
* libyui-devel-4.3.7-150400.3.5.4
* libyui-qt-pkg-devel-4.3.7-150400.3.5.4
* libyui-ncurses-pkg16-4.3.7-150400.3.5.4
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.15.4
* libyui-qt16-debuginfo-4.3.7-150400.3.5.4
* libyui-rest-api-devel-4.3.7-150400.3.5.4
* PackageKit-devel-1.2.4-150400.3.15.4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* zypper-log-1.14.71-150400.3.45.2
* zypper-needs-restarting-1.14.71-150400.3.45.2
* PackageKit-lang-1.2.4-150400.3.15.4
* PackageKit-branding-SLE-12.0-150400.15.2.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.15.4
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.15.4
* PackageKit-gtk3-module-1.2.4-150400.3.15.4
* PackageKit-gstreamer-plugin-1.2.4-150400.3.15.4
* PackageKit-debuginfo-1.2.4-150400.3.15.4
* PackageKit-debugsource-1.2.4-150400.3.15.4
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1175678
* https://bugzilla.suse.com/show_bug.cgi?id=1218171
* https://bugzilla.suse.com/show_bug.cgi?id=1221525
* https://bugzilla.suse.com/show_bug.cgi?id=1222086
* https://jira.suse.com/browse/OBS-301
* https://jira.suse.com/browse/PED-8014
1
0
18 Apr '24
# Security update for tomcat
Announcement ID: SUSE-SU-2024:1345-1
Rating: important
References:
* bsc#1221385
* bsc#1221386
Cross-References:
* CVE-2024-23672
* CVE-2024-24549
CVSS scores:
* CVE-2024-23672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24549 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
* SUSE Package Hub 15 15-SP5
* Web and Scripting Module 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for tomcat fixes the following issues:
* CVE-2024-24549: Fixed denial of service during header validation for HTTP/2
stream (bsc#1221386)
* CVE-2024-23672: Fixed denial of service due to malicious WebSocket client
keeping connection open (bsc#1221385)
Other fixes: \- Update to Tomcat 9.0.87
* Catalina \+ Fix: Minor performance improvement for building filter chains.
Based on ideas from #702 by Luke Miao. (remm) \+ Fix: Align error handling for
Writer and OutputStream. Ensure use of either once the response has been
recycled triggers a NullPointerException provided that discardFacades is
configured with the default value of true. (markt) \+ Fix: 68692: The standard
thread pool implementations that are configured using the Executor element now
implement ExecutorService for better support NIO2. (remm) \+ Fix: 68495: When
restoring a saved POST request after a successful FORM authentication, ensure
that neither the URI, the query string nor the protocol are corrupted when
restoring the request body. (markt) \+ Fix: 68721: Workaround a possible cause
of duplicate class definitions when using ClassFileTransformers and the
transformation of a class also triggers the loading of the same class. (markt)
\+ Fix: The rewrite valve should not do a rewrite if the output is identical to
the input. (remm) \+ Update: Add a new valveSkip (or VS) rule flag to the
rewrite valve to allow skipping over the next valve in the Catalina pipeline.
(remm) \+ Fix: Correct JPMS and OSGi meta-data for tomcat-enbed-core.jar by
removing reference to org.apache.catalina.ssi package that is no longer included
in the JAR. Based on pull request #684 by Jendrik Johannes. (markt) \+ Fix: Fix
ServiceBindingPropertySource so that trailing \r\n sequences are correctly
removed from files containing property values when configured to do so. Bug
identified by Coverity Scan. (markt) \+ Add: Add improvements to the CSRF
prevention filter including the ability to skip adding nonces for resource name
and subtree URL patterns. (schultz) \+ Fix: Review usage of debug logging and
downgrade trace or data dumping operations from debug level to trace. (remm) \+
Fix: 68089: Further improve the performance of request attribute access for
ApplicationHttpRequest and ApplicationRequest. (markt) \+ Fix: 68559: Allow
asynchronous error handling to write to the response after an error during
asynchronous processing. (markt) * Coyote \+ Fix: Improve the HTTP/2 stream
prioritisation process. If a stream uses all of the connection windows and still
has content to write, it will now be added to the backlog immediately rather
than waiting until the write attempt for the remaining content. (markt) \+ Fix:
Make asynchronous error handling more robust. Ensure that once a connection is
marked to be closed, further asynchronous processing cannot change that. (markt)
\+ Fix: Make asynchronous error handling more robust. Ensure that once the call
to AsyncListener.onError() has returned to the container, only container threads
can access the AsyncContext. This protects against various race conditions that
woudl otherwise occur if application threads continued to access the
AsyncContext. \+ Fix: Review usage of debug logging and downgrade trace or data
dumping operations from debug level to trace. In particular, most of the HTTP/2
debug logging has been changed to trace level. (remm) \+ Fix: Add support for
user provided SSLContext instances configured on SSLHostConfigCertificate
instances. Based on pull request #673 provided by Hakan Altındağ. (markt) \+
Fix: Improve the Tomcat Native shutdown process to reduce the likelihood of a
JVM crash during Tomcat shutdown. (markt) \+ Fix: Partial fix for 68558: Cache
the result of converting to String for request URI, HTTP header names and the
request Content-Type value to improve performance by reducing repeated byte[] to
String conversions. (markt) \+ Fix: Improve error reporting to HTTP/2 clients
for header processing errors by reporting problems at the end of the frame where
the error was detected rather than at the end of the headers. (markt) \+ Fix:
Remove the remaining reference to a stream once the stream has been recycled.
This makes the stream eligible for garbage collection earlier and thereby
improves scalability. (markt) * Jasper \+ Add: Add support for specifying Java
22 (with the value 22) as the compiler source and/or compiler target for JSP
compilation. If used with an Eclipse JDT compiler version that does not support
these values, a warning will be logged and the default will used. (markt) \+
Fix: 68546: Generate optimal size and types for JSP imports maps, as suggested
by John Engebretson. (remm) \+ Fix: Review usage of debug logging and downgrade
trace or data dumping operations from debug level to trace. (remm) * Cluster \+
Fix: Avoid updating request count stats on async. (remm) * WebSocket \+ Fix:
Correct a regression in the fix for 66508 that could cause an UpgradeProcessor
leak in some circumstances. (markt) \+ Fix: Review usage of debug logging and
downgrade trace or data dumping operations from debug level to trace. (remm) \+
Fix: Ensure that WebSocket connection closure completes if the connection is
closed when the server side has used the proprietary suspend/resume feature to
suspend the connection. (markt) * Web applications \+ Add: Add support for
responses in JSON format from the examples application RequestHeaderExample.
(schultz) * Other \+ Add: Improvements to French translations. (remm) \+ Add:
Improvements to Japanese translations by tak7iji. (markt) \+ Update: Update
Checkstyle to 10.13.0. (markt) \+ Update: Update JSign to 6.0. (markt) \+
Update: Add strings for debug level messages. (remm) \+ Update: Update Tomcat
Native to 1.3.0. (markt) \+ Add: Improvements to French translations. (remm) \+
Add: Improvements to Japanese translations by tak7iji. (markt)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1345=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1345=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1345=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1345=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1345=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1345=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1345=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1345=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1345=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1345=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1345=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1345=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1345=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1345=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1345=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1345=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1345=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1345=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-jsvc-debuginfo-1.3.4-150200.11.14.1
* apache-commons-daemon-jsvc-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* openSUSE Leap 15.5 (noarch)
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* geronimo-servlet-2_5-api-1.2-150200.15.8.1
* geronimo-j2ee-1_4-apis-1.2-150200.15.8.1
* geronimo-ws-metadata-2_0-api-1.2-150200.15.8.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* geronimo-j2ee-management-1_1-api-1.2-150200.15.8.1
* geronimo-javamail-1_3_1-api-1.2-150200.15.8.1
* geronimo-jsp-2_1-api-1.2-150200.15.8.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* geronimo-jaxr-1_0-api-1.2-150200.15.8.1
* geronimo-jaxrpc-1_1-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-corba-1_0-apis-1.2-150200.15.8.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-docs-webapp-9.0.87-150200.65.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jacc-1_0-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* geronimo-j2ee-management-1_0-api-1.2-150200.15.8.1
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* geronimo-j2ee-deployment-1_1-api-1.2-150200.15.8.1
* geronimo-saaj-1_1-api-1.2-150200.15.8.1
* geronimo-javaee-deployment-1_1-api-1.2-150200.15.8.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-interceptor-3_0-api-1.2-150200.15.8.1
* geronimo-jsp-2_0-api-1.2-150200.15.8.1
* apache-commons-dbcp-javadoc-2.1.1-150200.10.8.1
* geronimo-commonj-1_1-apis-1.2-150200.15.8.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-9.0.87-150200.65.1
* geronimo-jta-1_0_1B-api-1.2-150200.15.8.1
* geronimo-ejb-3_0-api-1.2-150200.15.8.1
* geronimo-el-1_0-api-1.2-150200.15.8.1
* geronimo-j2ee-connector-1_5-api-1.2-150200.15.8.1
* tomcat-lib-9.0.87-150200.65.1
* apache-commons-daemon-javadoc-1.3.4-150200.11.14.1
* geronimo-corba-2_3-apis-1.2-150200.15.8.1
* tomcat-javadoc-9.0.87-150200.65.1
* geronimo-servlet-2_4-api-1.2-150200.15.8.1
* geronimo-javamail-1_4-api-1.2-150200.15.8.1
* geronimo-jaf-1_0_2-api-1.2-150200.15.8.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-pool2-javadoc-2.4.2-150200.11.8.1
* geronimo-jaf-1_1-api-1.2-150200.15.8.1
* geronimo-ejb-2_1-api-1.2-150200.15.8.1
* tomcat-embed-9.0.87-150200.65.1
* geronimo-jacc-1_1-api-1.2-150200.15.8.1
* jakarta-taglibs-standard-javadoc-1.1.1-150000.4.10.1
* tomcat-jsvc-9.0.87-150200.65.1
* geronimo-qname-1_1-api-1.2-150200.15.8.1
* geronimo-jpa-3_0-api-1.2-150200.15.8.1
* Development Tools Module 15-SP5 (noarch)
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* SUSE Package Hub 15 15-SP5 (noarch)
* geronimo-j2ee-connector-1_5-api-1.2-150200.15.8.1
* geronimo-j2ee-1_4-apis-1.2-150200.15.8.1
* geronimo-servlet-2_4-api-1.2-150200.15.8.1
* geronimo-javamail-1_4-api-1.2-150200.15.8.1
* geronimo-jsp-2_0-api-1.2-150200.15.8.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* geronimo-jaf-1_1-api-1.2-150200.15.8.1
* SUSE Manager Server 4.3 Module 4.3 (noarch)
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* Web and Scripting Module 15-SP5 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Manager Server 4.3 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* apache-commons-daemon-1.3.4-150200.11.14.1
* apache-commons-daemon-debugsource-1.3.4-150200.11.14.1
* SUSE Enterprise Storage 7.1 (noarch)
* apache-commons-pool2-2.4.2-150200.11.8.1
* geronimo-annotation-1_0-api-1.2-150200.15.8.1
* tomcat-jsp-2_3-api-9.0.87-150200.65.1
* tomcat-lib-9.0.87-150200.65.1
* jakarta-taglibs-standard-1.1.1-150000.4.10.1
* tomcat-servlet-4_0-api-9.0.87-150200.65.1
* tomcat-webapps-9.0.87-150200.65.1
* geronimo-stax-1_0-api-1.2-150200.15.8.1
* tomcat-admin-webapps-9.0.87-150200.65.1
* geronimo-jta-1_1-api-1.2-150200.15.8.1
* tomcat-el-3_0-api-9.0.87-150200.65.1
* geronimo-jms-1_1-api-1.2-150200.15.8.1
* apache-commons-dbcp-2.1.1-150200.10.8.1
* tomcat-9.0.87-150200.65.1
## References:
* https://www.suse.com/security/cve/CVE-2024-23672.html
* https://www.suse.com/security/cve/CVE-2024-24549.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221385
* https://bugzilla.suse.com/show_bug.cgi?id=1221386
1
0
18 Apr '24
# Recommended update for wicked
Announcement ID: SUSE-RU-2024:1335-1
Rating: moderate
References:
* bsc#1222105
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has one fix can now be installed.
## Description:
This update for wicked fixes the following issues:
* Do not convert sec to msec twice (bsc#1222105)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1335=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1335=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1335=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1335=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1335=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1335=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1335=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1335=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* wicked-service-0.6.74-150300.4.24.1
* wicked-debugsource-0.6.74-150300.4.24.1
* wicked-debuginfo-0.6.74-150300.4.24.1
* wicked-0.6.74-150300.4.24.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222105
1
0
18 Apr '24
# Recommended update for wicked
Announcement ID: SUSE-RU-2024:1337-1
Rating: moderate
References:
* bsc#1222105
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for wicked fixes the following issues:
* Do not convert sec to msec twice (bsc#1222105)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1337=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1337=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1337=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1337=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1337=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1337=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1337=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1337=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1337=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1337=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1337=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1337=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1337=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1337=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1337=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Manager Proxy 4.3 (x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* wicked-debugsource-0.6.74-150400.3.19.1
* wicked-service-0.6.74-150400.3.19.1
* wicked-debuginfo-0.6.74-150400.3.19.1
* wicked-0.6.74-150400.3.19.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222105
1
0
18 Apr '24
# Security update for pgadmin4
Announcement ID: SUSE-SU-2024:1340-1
Rating: important
References:
* bsc#1221172
Cross-References:
* CVE-2024-2044
CVSS scores:
* CVE-2024-2044 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for pgadmin4 fixes the following issues:
* CVE-2024-2044: Fixed unsafe deserialization and Remote Code Execution by an
authenticated user (bsc#1221172)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1340=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1340=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1340=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1340=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1340=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1340=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1340=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1340=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1340=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1340=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1340=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1340=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1340=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1340=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* openSUSE Leap 15.3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* pgadmin4-web-uwsgi-4.30-150300.3.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* openSUSE Leap 15.5 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* pgadmin4-web-uwsgi-4.30-150300.3.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* Server Applications Module 15-SP5 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Manager Proxy 4.3 (x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Manager Proxy 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Manager Server 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* pgadmin4-debuginfo-4.30-150300.3.12.1
* pgadmin4-4.30-150300.3.12.1
* SUSE Enterprise Storage 7.1 (noarch)
* pgadmin4-web-4.30-150300.3.12.1
* pgadmin4-doc-4.30-150300.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2044.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221172
1
0
18 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1332-2
Rating: important
References:
* bsc#1194869
* bsc#1200465
* bsc#1205316
* bsc#1207948
* bsc#1209635
* bsc#1209657
* bsc#1212514
* bsc#1213456
* bsc#1214852
* bsc#1215221
* bsc#1215322
* bsc#1217339
* bsc#1217959
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1218321
* bsc#1218336
* bsc#1218479
* bsc#1218643
* bsc#1218777
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1219834
* bsc#1220114
* bsc#1220176
* bsc#1220237
* bsc#1220251
* bsc#1220320
* bsc#1220337
* bsc#1220340
* bsc#1220365
* bsc#1220366
* bsc#1220398
* bsc#1220411
* bsc#1220413
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220492
* bsc#1220703
* bsc#1220775
* bsc#1220790
* bsc#1220797
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220883
* bsc#1220885
* bsc#1220887
* bsc#1220898
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220932
* bsc#1220937
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221044
* bsc#1221045
* bsc#1221046
* bsc#1221048
* bsc#1221055
* bsc#1221056
* bsc#1221058
* bsc#1221060
* bsc#1221061
* bsc#1221062
* bsc#1221066
* bsc#1221067
* bsc#1221068
* bsc#1221069
* bsc#1221070
* bsc#1221071
* bsc#1221077
* bsc#1221082
* bsc#1221090
* bsc#1221097
* bsc#1221156
* bsc#1221252
* bsc#1221273
* bsc#1221274
* bsc#1221276
* bsc#1221277
* bsc#1221291
* bsc#1221293
* bsc#1221298
* bsc#1221337
* bsc#1221338
* bsc#1221375
* bsc#1221379
* bsc#1221551
* bsc#1221553
* bsc#1221613
* bsc#1221614
* bsc#1221616
* bsc#1221618
* bsc#1221631
* bsc#1221633
* bsc#1221713
* bsc#1221777
* bsc#1221814
* bsc#1221816
* bsc#1221830
* bsc#1221951
* bsc#1222033
* bsc#1222056
* bsc#1222060
* bsc#1222070
* bsc#1222073
* bsc#1222117
* bsc#1222274
* bsc#1222291
* bsc#1222300
* bsc#1222304
* bsc#1222317
* bsc#1222331
* bsc#1222355
* bsc#1222356
* bsc#1222360
* bsc#1222366
* bsc#1222373
* bsc#1222619
* jsc#PED-5759
* jsc#PED-7167
* jsc#PED-7619
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-4744
* CVE-2022-48626
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-0160
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-4881
* CVE-2023-52447
* CVE-2023-52450
* CVE-2023-52453
* CVE-2023-52454
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52476
* CVE-2023-52477
* CVE-2023-52481
* CVE-2023-52484
* CVE-2023-52486
* CVE-2023-52492
* CVE-2023-52493
* CVE-2023-52494
* CVE-2023-52497
* CVE-2023-52500
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52518
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52532
* CVE-2023-52563
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52587
* CVE-2023-52591
* CVE-2023-52594
* CVE-2023-52595
* CVE-2023-52597
* CVE-2023-52598
* CVE-2023-52599
* CVE-2023-52600
* CVE-2023-52601
* CVE-2023-52602
* CVE-2023-52603
* CVE-2023-52604
* CVE-2023-52605
* CVE-2023-52606
* CVE-2023-52607
* CVE-2023-52608
* CVE-2023-52612
* CVE-2023-52615
* CVE-2023-52617
* CVE-2023-52619
* CVE-2023-52621
* CVE-2023-52623
* CVE-2023-52628
* CVE-2023-52632
* CVE-2023-52637
* CVE-2023-52639
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-25739
* CVE-2024-26599
* CVE-2024-26600
* CVE-2024-26602
* CVE-2024-26612
* CVE-2024-26614
* CVE-2024-26620
* CVE-2024-26627
* CVE-2024-26629
* CVE-2024-26642
* CVE-2024-26645
* CVE-2024-26646
* CVE-2024-26651
* CVE-2024-26654
* CVE-2024-26659
* CVE-2024-26664
* CVE-2024-26667
* CVE-2024-26670
* CVE-2024-26695
* CVE-2024-26717
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52494 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26599 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26599 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26629 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26646 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 135 vulnerabilities, contains three features and has 29
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.
NOTE: This update has been retracted due to a bug in the BHI CPU sidechannel
mitigation, which led to incorrect selection of other CPU mitigations.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2022-4744: Fixed double-free that could lead to DoS or privilege
escalation in TUN/TAP device driver functionality (bsc#1209635).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520
(bsc#1220887).
* CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).
* CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
* CVE-2023-52494: Fixed missing alignment check for event ring read pointer in
bus/mhi/host (bsc#1221273).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson
(bsc#1220937).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).
* CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).
* CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs
(bsc#1221062).
* CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
* CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs
(bsc#1221068).
* CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs
(bsc#1221070).
* CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot()
(bsc#1221066).
* CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree()
(bsc#1221067).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib
(bsc#1221069).
* CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi
(bsc#1221375).
* CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
(bsc#1221616).
* CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
* CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove
(bsc#1221613).
* CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
number in pstore/ram (bsc#1221618).
* CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
* CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd
(bsc#1222274).
* CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939
(bsc#1222291).
* CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed
(bsc#1222300).
* CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-0841: Fixed null pointer dereference in hugetlbfs_fill_super()
(bsc#1219264).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate()
(bsc#1220365).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences
(bsc#1221291).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap
(bsc#1221298).
* CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
* CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in
nfsd (bsc#1221379).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26645: Fixed missing visibility when inserting an element into
tracing_map (bsc#1222056).
* CVE-2024-26646: Fixed potential memory corruption when resuming from suspend
or hibernation in thermal/intel/hfi (bsc#1222070).
* CVE-2024-26651: Fixed possible oops via malicious devices in sr9800
(bsc#1221337).
* CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
* CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
events in xhci (bsc#1222317).
* CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in
hwmon coretemp (bsc#1222355).
* CVE-2024-26667: Fixed null pointer reference in
dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
* CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in
kernel arm64 (bsc#1222356).
* CVE-2024-26695: Fixed null pointer dereference in
__sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
* CVE-2024-26717: Fixed null pointer dereference on failed power up in HID
i2c-hid-of (bsc#1222360).
The following non-security bugs were fixed:
* Revert "PCI: tegra194: Enable support for 256 Byte payload" (git-fixes).
* Revert "Revert "drm/amdgpu/display: change pipe policy for DCN 2.0"" (git-
fixes).
* Revert "SUNRPC dont update timeout value on connection reset" (git-fixes).
* Revert "drm/amd: Disable PSR-SU on Parade 0803 TCON" (git-fixes).
* Revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" (git-
fixes).
* Revert "drm/amdgpu/display: change pipe policy for DCN 2.0" (git-fixes).
* Revert "drm/amdgpu/display: change pipe policy for DCN 2.1" (git-fixes).
* Revert "drm/vc4: hdmi: Enforce the minimum rate at runtime_resume" (git-
fixes).
* Revert "fbdev: flush deferred IO before closing (git-fixes)." (bsc#1221814)
* acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-
fixes).
* acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-
fixes).
* acpi: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-
fixes).
* acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* acpi: scan: Fix device check notification handling (git-fixes).
* acpica: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
* alsa: aoa: avoid false-positive format truncation warning (git-fixes).
* alsa: aw2: avoid casting function pointers (git-fixes).
* alsa: ctxfi: avoid casting function pointers (git-fixes).
* alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-
fixes).
* alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-
fixes).
* alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897
platform (git-fixes).
* alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
* alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
* alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
* alsa: seq: fix function cast warnings (git-fixes).
* alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* alsa: usb-audio: Stop parsing channels bits when all channels are found
(git-fixes).
* arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-
fixes)
* arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
* arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
* arm64: mm: fix VA-range sanity check (git-fixes)
* arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
* asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
(stable-fixes).
* asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
* asoc: amd: acp: fix for acp_init function error handling (git-fixes).
* asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
* asoc: meson: Use dev_err_probe() helper (stable-fixes).
* asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
* asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
* asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
* asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
* asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
* asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* asoc: rt5682-sdw: fix locking sequence (git-fixes).
* asoc: rt711-sdca: fix locking sequence (git-fixes).
* asoc: rt711-sdw: fix locking sequence (git-fixes).
* asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-
fixes).
* asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
* asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-
fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* backlight: da9052: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-
fixes).
* backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
* backlight: lm3639: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lp8788: Fully initialize backlight_properties during probe (git-
fixes).
* blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
* bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
* bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
* bluetooth: remove HCI_POWER_OFF_TIMEOUT (git-fixes).
* bluetooth: remove superfluous call to hci_conn_check_pending() (git-fixes).
* bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-
fixes).
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
* can: softing: remove redundant NULL check (git-fixes).
* clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-
fixes).
* comedi: comedi_test: Prevent timers rescheduling during deletion (git-
fixes).
* coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
* coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
* coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus
(bsc#1220775)
* cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf()
(git-fixes).
* cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value
(git-fixes).
* crypto: arm/sha - fix function cast warnings (git-fixes).
* crypto: qat - avoid division by zero (git-fixes).
* crypto: qat - fix deadlock in backlog processing (git-fixes).
* crypto: qat - fix double free during reset (git-fixes).
* crypto: qat - fix state machines cleanup paths (bsc#1218321).
* crypto: qat - fix unregistration of compression algorithms (git-fixes).
* crypto: qat - fix unregistration of crypto algorithms (git-fixes).
* crypto: qat - ignore subsequent state up commands (git-fixes).
* crypto: qat - increase size of buffers (git-fixes).
* crypto: qat - resolve race condition during AER recovery (git-fixes).
* crypto: xilinx - call finalize with bh disabled (git-fixes).
* doc-guide: kernel-doc: tell about object-like macros (git-fixes).
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* drivers: hv: vmbus: Calculate ring buffer size for more efficient use of
memory (git-fixes).
* drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
* drm/amd/display: Add function for validate and update new stream (git-
fixes).
* drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
* drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-
fixes).
* drm/amd/display: Check if link state is valid (git-fixes).
* drm/amd/display: Copy DC context in the commit streams (git-fixes).
* drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
* drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
* drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
* drm/amd/display: Exit idle optimizations before attempt to access PHY (git-
fixes).
* drm/amd/display: Expand kernel doc for DC (git-fixes).
* drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
* drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
(git-fixes).
* drm/amd/display: Fix possible underflow for displays with large vblank (git-
fixes).
* drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
* drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
* drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-
fixes).
* drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-
fixes).
* drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
* drm/amd/display: Handle seamless boot stream (git-fixes).
* drm/amd/display: Handle virtual hardware detect (git-fixes).
* drm/amd/display: Include surface of unaffected streams (git-fixes).
* drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
* drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml
(git-fixes).
* drm/amd/display: Keep PHY active for dp config (git-fixes).
* drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
* drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
* drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Revert vblank change that causes null pointer crash (git-
fixes).
* drm/amd/display: Rework comments on dc file (git-fixes).
* drm/amd/display: Rework context change check (git-fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-
fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-
fixes).
* drm/amd/display: Update OTG instance in the commit stream (git-fixes).
* drm/amd/display: Update correct DCN314 register header (git-fixes).
* drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-
fixes).
* drm/amd/display: Use DRAM speed from validation for dummy p-state (git-
fixes).
* drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
* drm/amd/display: Use min transition for all SubVP plane add/remove (git-
fixes).
* drm/amd/display: Write to correct dirty_rect (git-fixes).
* drm/amd/display: Wrong colorimetry workaround (git-fixes).
* drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
* drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
* drm/amd/display: always switch off ODM before committing more streams (git-
fixes).
* drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-
fixes).
* drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
* drm/amd/display: ensure async flips are only accepted for fast updates (git-
fixes).
* drm/amd/display: fix ABM disablement (git-fixes).
* drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()
(git-fixes).
* drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
* drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
* drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
* drm/amd/display: fix unbounded requesting for high pixel rate modes on
dcn315 (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: perform a bounds check before filling dirty rectangles
(git-fixes).
* drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
* drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
* drm/amd/display: use low clocks for no plane configs (git-fixes).
* drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
* drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
* drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock
(git-fixes).
* drm/amd: Enable PCIe PME from D3 (git-fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
* drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
* drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int()
(git-fixes).
* drm/amdgpu: Force order between a read and write to the same address (git-
fixes).
* drm/amdgpu: Match against exact bootloader status (git-fixes).
* drm/amdgpu: Unset context priority is now invalid (git-fixes).
* drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: lower CS errors to debug severity (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
* drm/display: fix typo (git-fixes).
* drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
* drm/etnaviv: Restore some id values (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/exynos: fix a possible null-pointer dereference due to data race in
exynos_drm_crtc_atomic_disable() (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
* drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
* drm/i915: Add missing CCS documentation (git-fixes).
* drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled
(git-fixes).
* drm/i915: Check before removing mm notifier (git-fixes).
* drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
* drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
(git-fixes).
* drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
* drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-
fixes).
* drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
* drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
* drm/msm/dpu: improve DSC allocation (git-fixes).
* drm/panel-edp: use put_sync in unprepare (git-fixes).
* drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-
fixes).
* drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
* drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-
fixes).
* drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
* drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
* drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
* drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
* drm/rockchip: lvds: do not overwrite error code (git-fixes).
* drm/rockchip: lvds: do not print scary message when probing defer (git-
fixes).
* drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-
fixes).
* drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
* drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path
of tegra_dsi_probe() (git-fixes).
* drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-
fixes).
* drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-
fixes).
* drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
* drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-
fixes).
* drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths
of tegra_output_probe() (git-fixes).
* drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
* drm/tegra: rgb: Fix missing clk_put() in the error handling paths of
tegra_dc_rgb_probe() (git-fixes).
* drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-
fixes).
* drm/tidss: Fix initial plane zpos values (git-fixes).
* drm/tidss: Fix sync-lost issue with two displays (git-fixes).
* drm/ttm: Do not leak a resource on eviction error (git-fixes).
* drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
* drm/vc4: Add module dependency on hdmi-codec (git-fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-
fixes).
* drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
* drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017)
(git-fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* fix "coresight: etm4x: Change etm4_platform_driver driver for MMIO devices"
(bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to
another function.
* force config_TCG_TIS_CORE=m on aarch64 for workaround kconfig issues
* group-source-files.pl: Quote filenames (boo#1221077). The kernel source now
contains a file with a space in the name. Add quotes in group-source-
files.pl to avoid splitting the filename. Also use -print0 / -0 when
updating timestamps.
* hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
* hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
* hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-
fixes).
* hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-
fixes).
* hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-
fixes).
* i2c: aspeed: Fix the dummy irq expected print (git-fixes).
* i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-
fixes).
* i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
* ib/ipoib: fix mcast list locking (git-fixes)
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
* input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
* iommu/amd: Mark interrupt as managed (git-fixes).
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-
fixes).
* iommu/mediatek: Fix forever loop in error handling (git-fixes).
* iommu/vt-d: Allow to use flush-queue when first level is default (git-
fixes).
* iommu/vt-d: Do not issue ATS Invalidation request when device is
disconnected (git-fixes).
* iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
* iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
* kABI: PCI: Add locking to RMW PCI Express Capability Register accessors
(kabi).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kernel-binary: Fix i386 build Fixes: 89eaf4cdce05 ("rpm templates: Move
macro definitions below buildrequires")
* kernel-binary: Move build script to the end All other spec templates have
the build script at the end, only kernel-binary has it in the middle. Align
with the other templates.
* kernel-binary: certs: Avoid trailing space
* kernel-binary: vdso: fix filelist for non-usrmerged kernel Fixes:
a6ad8af207e6 ("rpm templates: Always define usrmerged")
* kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
* leds: aw2013: Unlock mutex before destroying it (git-fixes).
* lib/cmdline: Fix an invalid format specifier in an assertion msg (git-
fixes).
* make nvidia Grace-Hopper TPM related drivers build-ins (bsc#1221156)
* md: fix data corruption for raid456 when reshape restart while grow up (git-
fixes).
* media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
* media: edia: dvbdev: fix a use-after-free (git-fixes).
* media: em28xx: annotate unchecked call to media_device_register() (git-
fixes).
* media: go7007: add check of return value of go7007_read_addr() (git-fixes).
* media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
* media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
* media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
* media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
* media: pvrusb2: remove redundant NULL check (git-fixes).
* media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-
fixes).
* media: sun8i-di: Fix chroma difference threshold (git-fixes).
* media: sun8i-di: Fix coefficient writes (git-fixes).
* media: sun8i-di: Fix power on/off sequences (git-fixes).
* media: tc358743: register v4l2 async device only after successful setup
(git-fixes).
* media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
* media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
* media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
* media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
* media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
* mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a
ref (git-fixes).
* mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref
(git-fixes).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Fix switch on gp3 partition (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
* mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
* mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
* mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove
function (git-fixes).
* mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
* mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
* mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
* net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* net: Fix features skip in for_each_netdev_feature() (git-fixes).
* net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfs: fix an off by one in root_nfs_cat() (git-fixes).
* nfs: rename nfs_client_kset to nfs_kset (git-fixes).
* nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* nfsd: convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
* nfsd: fix file memleak on client_opens_release (git-fixes).
* nfsd: fix liSTXATTRS returning a short list with eof=TRUE (git-fixes).
* nfsd: fix liSTXATTRS returning more bytes than maxcount (git-fixes).
* nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
* nfsd: lock_rename() needs both directories to live on the same fs (git-
fixes).
* nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* nfsd: retransmit callbacks after client reconnects (git-fixes).
* nfsd: use vfs setgid helper (git-fixes).
* nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
* nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
* nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nfsv4.2: fix wrong shrinker_id (git-fixes).
* nfsv4: fix a nfs4_state_manager() race (git-fixes).
* nfsv4: fix a state manager thread deadlock regression (git-fixes).
* nilfs2: fix failure to detect DAT corruption in btree and direct mappings
(git-fixes).
* nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats
(git-fixes).
* pNFS: Fix a hang in nfs4_evict_inode() (git-fixes).
* pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
* pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
* pci/aspm: use RMW accessors for changing LNKCTL (git-fixes).
* pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
* pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
* pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
* pci: add locking to RMW PCI Express Capability Register accessors (git-
fixes).
* pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
* pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-
fixes).
* pci: dwc: fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
* pci: fu740: Set the number of MSI vectors (git-fixes).
* pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-
fixes).
* pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
* pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
* pci: mediatek: Clear interrupt status before dispatching handler (git-
fixes).
* pci: qcom: enable BDF to SID translation properly (git-fixes).
* pci: qcom: use DWC helpers for modifying the read-only DBI registers (git-
fixes).
* pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
* pci: rockchip: Fix window mapping and address translation for endpoint (git-
fixes).
* pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
* pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-
fixes).
* pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-
fixes).
* platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
* pm: suspend: Set mem_sleep_current during kernel command line setup (git-
fixes).
* powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
* powerpc/boot: Disable power10 features after BOOTAFLAGS assignment
(bsc#1194869).
* powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU
(bsc#1194869).
* powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses
(bsc#1194869).
* powerpc/lib/sstep: Remove unneeded #ifdef **powerpc64** (bsc#1194869).
* powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding
(bsc#1194869).
* powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465
ltc#197256 jsc#SLE-18130 git-fixes).
* powerpc/sstep: Use bitwise instead of arithmetic operator for flags
(bsc#1194869).
* powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
* pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-
fixes).
* qedf: Do not process stag work during unload (bsc#1214852).
* qedf: Wait for stag work during unload (bsc#1214852).
* raid1: fix use-after-free for original bio in raid1_write_request()
(bsc#1221097).
* ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
* ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
* ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
* ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
* ras/amd/fmpm: Save SPA values (jsc#PED-7619).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
* ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
* rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
* rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
* rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
* rdma/irdma: Remove duplicate assignment (git-fixes)
* rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
* rdma/mlx5: fix fortify source warning while accessing Eth segment (git-
fixes)
* rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
* rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-
fixes)
* rdma/srpt: do not register event handler until srpt device is fully setup
(git-fixes)
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes
bsc#1221633).
* s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
* s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
* s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
* sched/rt: Disallow writing invalid values to sched_rt_period_us
(bsc#1220176).
* sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
(bsc#1220176).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
* scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
* scsi: qedf: Remove unused declaration (bsc#1214852).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: storvsc: Fix ring buffer size calculation (git-fixes).
* scsi: target: core: Silence the message about unknown VPD pages
(bsc#1221252).
* selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* sr9800: Add check for usbnet_get_endpoints (git-fixes).
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
* sunrpc: ECONNRESET might require a rebind (git-fixes).
* sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
* sunrpc: Fix a suspicious RCU usage warning (git-fixes).
* sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
* sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
* svcrdma: Drop connection after an RDMA Read error (git-fixes).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
* tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-
fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: port: Do not try to peer unused USB ports based on location (git-
fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-
fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vt: fix unicode buffer corruption when deleting characters (git-fixes).
* watchdog: stm32_iwdg: initialize default timeout (git-fixes).
* wifi: ath10k: fix NULL pointer dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
* wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete
(git-fixes).
* wifi: b43: Disable QoS for bcm4331 (git-fixes).
* wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-
fixes).
* wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-
fixes).
* wifi: brcmsmac: avoid function pointer casts (git-fixes).
* wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
* wifi: iwlwifi: fix EWRD table validity check (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
* wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-
fixes).
* wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
* wifi: mwifiex: debugfs: Drop unnecessary error check for
debugfs_create_dir() (git-fixes).
* wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
* wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
* wifi: wilc1000: fix RCU usage in connect path (git-fixes).
* wifi: wilc1000: fix declarations ordering (stable-fixes).
* wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
* wifi: wilc1000: prevent use-after-free on vif when cleaning up all
interfaces (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
* xhci: process isoc TD properly when there was a transaction error mid TD
(git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1332=1 openSUSE-SLE-15.5-2024-1332=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1332=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* kernel-azure-extra-5.14.21-150500.33.42.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-optional-5.14.21-150500.33.42.1
* reiserfs-kmp-azure-5.14.21-150500.33.42.1
* gfs2-kmp-azure-5.14.21-150500.33.42.1
* kernel-syms-azure-5.14.21-150500.33.42.1
* kernel-azure-devel-5.14.21-150500.33.42.1
* kselftests-kmp-azure-5.14.21-150500.33.42.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.42.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* cluster-md-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-debuginfo-5.14.21-150500.33.42.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.42.1
* kernel-azure-debugsource-5.14.21-150500.33.42.1
* dlm-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.42.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* ocfs2-kmp-azure-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-vdso-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.42.1
* kernel-source-azure-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-syms-azure-5.14.21-150500.33.42.1
* kernel-azure-devel-5.14.21-150500.33.42.1
* kernel-azure-debugsource-5.14.21-150500.33.42.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-debuginfo-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.42.1
* kernel-source-azure-5.14.21-150500.33.42.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-4744.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52453.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52481.html
* https://www.suse.com/security/cve/CVE-2023-52484.html
* https://www.suse.com/security/cve/CVE-2023-52486.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52493.html
* https://www.suse.com/security/cve/CVE-2023-52494.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52518.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52563.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52587.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52594.html
* https://www.suse.com/security/cve/CVE-2023-52595.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52598.html
* https://www.suse.com/security/cve/CVE-2023-52599.html
* https://www.suse.com/security/cve/CVE-2023-52600.html
* https://www.suse.com/security/cve/CVE-2023-52601.html
* https://www.suse.com/security/cve/CVE-2023-52602.html
* https://www.suse.com/security/cve/CVE-2023-52603.html
* https://www.suse.com/security/cve/CVE-2023-52604.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52606.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52608.html
* https://www.suse.com/security/cve/CVE-2023-52612.html
* https://www.suse.com/security/cve/CVE-2023-52615.html
* https://www.suse.com/security/cve/CVE-2023-52617.html
* https://www.suse.com/security/cve/CVE-2023-52619.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2023-52623.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-52632.html
* https://www.suse.com/security/cve/CVE-2023-52637.html
* https://www.suse.com/security/cve/CVE-2023-52639.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-26599.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26612.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26620.html
* https://www.suse.com/security/cve/CVE-2024-26627.html
* https://www.suse.com/security/cve/CVE-2024-26629.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26645.html
* https://www.suse.com/security/cve/CVE-2024-26646.html
* https://www.suse.com/security/cve/CVE-2024-26651.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26659.html
* https://www.suse.com/security/cve/CVE-2024-26664.html
* https://www.suse.com/security/cve/CVE-2024-26667.html
* https://www.suse.com/security/cve/CVE-2024-26670.html
* https://www.suse.com/security/cve/CVE-2024-26695.html
* https://www.suse.com/security/cve/CVE-2024-26717.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1209635
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1218321
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218643
* https://bugzilla.suse.com/show_bug.cgi?id=1218777
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220114
* https://bugzilla.suse.com/show_bug.cgi?id=1220176
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220337
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220365
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220775
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220797
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220887
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220937
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221045
* https://bugzilla.suse.com/show_bug.cgi?id=1221046
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221056
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221060
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221062
* https://bugzilla.suse.com/show_bug.cgi?id=1221066
* https://bugzilla.suse.com/show_bug.cgi?id=1221067
* https://bugzilla.suse.com/show_bug.cgi?id=1221068
* https://bugzilla.suse.com/show_bug.cgi?id=1221069
* https://bugzilla.suse.com/show_bug.cgi?id=1221070
* https://bugzilla.suse.com/show_bug.cgi?id=1221071
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221082
* https://bugzilla.suse.com/show_bug.cgi?id=1221090
* https://bugzilla.suse.com/show_bug.cgi?id=1221097
* https://bugzilla.suse.com/show_bug.cgi?id=1221156
* https://bugzilla.suse.com/show_bug.cgi?id=1221252
* https://bugzilla.suse.com/show_bug.cgi?id=1221273
* https://bugzilla.suse.com/show_bug.cgi?id=1221274
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221277
* https://bugzilla.suse.com/show_bug.cgi?id=1221291
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221298
* https://bugzilla.suse.com/show_bug.cgi?id=1221337
* https://bugzilla.suse.com/show_bug.cgi?id=1221338
* https://bugzilla.suse.com/show_bug.cgi?id=1221375
* https://bugzilla.suse.com/show_bug.cgi?id=1221379
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221613
* https://bugzilla.suse.com/show_bug.cgi?id=1221614
* https://bugzilla.suse.com/show_bug.cgi?id=1221616
* https://bugzilla.suse.com/show_bug.cgi?id=1221618
* https://bugzilla.suse.com/show_bug.cgi?id=1221631
* https://bugzilla.suse.com/show_bug.cgi?id=1221633
* https://bugzilla.suse.com/show_bug.cgi?id=1221713
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221814
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221951
* https://bugzilla.suse.com/show_bug.cgi?id=1222033
* https://bugzilla.suse.com/show_bug.cgi?id=1222056
* https://bugzilla.suse.com/show_bug.cgi?id=1222060
* https://bugzilla.suse.com/show_bug.cgi?id=1222070
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222274
* https://bugzilla.suse.com/show_bug.cgi?id=1222291
* https://bugzilla.suse.com/show_bug.cgi?id=1222300
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222317
* https://bugzilla.suse.com/show_bug.cgi?id=1222331
* https://bugzilla.suse.com/show_bug.cgi?id=1222355
* https://bugzilla.suse.com/show_bug.cgi?id=1222356
* https://bugzilla.suse.com/show_bug.cgi?id=1222360
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222373
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-7619
1
0
18 Apr '24
# Recommended update for tftp
Announcement ID: SUSE-RU-2024:1341-1
Rating: moderate
References:
* bsc#1215520
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for tftp fixes the following issue:
* Allow enabling the service via `systemctl enable tftp` to create the
tftp.socket symlink (bsc#1215520)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1341=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1341=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1341=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1341=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1341=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1341=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1341=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1341=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1341=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1341=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1341=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1341=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1341=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1341=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1341=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1341=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1341=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1341=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1341=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1341=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1341=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1341=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1341=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1341=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1341=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1341=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1341=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* tftp-5.2-150000.5.6.2
* tftp-debuginfo-5.2-150000.5.6.2
* tftp-debugsource-5.2-150000.5.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1215520
1
0
SUSE-RU-2024:1342-1: moderate: Recommended update for unixODBC, libtool and libssh2_org
by OPENSUSE-UPDATES 18 Apr '24
by OPENSUSE-UPDATES 18 Apr '24
18 Apr '24
# Recommended update for unixODBC, libtool and libssh2_org
Announcement ID: SUSE-RU-2024:1342-1
Rating: moderate
References:
* bsc#1221622
* bsc#1221941
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that has two fixes can now be installed.
## Description:
This update for unixODBC, libtool and libssh2_org fixes the following issue:
* Ship 2 additional 32bit packages: unixODBC-32bit and libssh2-1-32bit for
SLES (bsc#1221941).
* Fix an issue with Encrypt-then-MAC family. (bsc#1221622)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1342=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1342=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1342=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1342=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1342=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1342=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1342=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1342=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1342=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1342=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1342=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1342=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1342=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1342=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1342=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1342=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1342=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1342=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1342=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1342=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1342=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1342=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1342=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1342=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1342=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1342=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1342=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1342=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1342=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* unixODBC-2.3.9-150400.16.5.3
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* unixODBC-debugsource-2.3.9-150400.16.5.3
* unixODBC-devel-2.3.9-150400.16.5.3
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* openSUSE Leap 15.4 (x86_64)
* libodbc2-32bit-debuginfo-2.3.9-150400.16.5.3
* unixODBC-32bit-2.3.9-150400.16.5.3
* unixODBC-devel-32bit-2.3.9-150400.16.5.3
* unixODBC-32bit-debuginfo-2.3.9-150400.16.5.3
* libodbc2-32bit-2.3.9-150400.16.5.3
* openSUSE Leap 15.4 (aarch64_ilp32)
* unixODBC-devel-64bit-2.3.9-150400.16.5.3
* libodbc2-64bit-2.3.9-150400.16.5.3
* libodbc2-64bit-debuginfo-2.3.9-150400.16.5.3
* unixODBC-64bit-debuginfo-2.3.9-150400.16.5.3
* unixODBC-64bit-2.3.9-150400.16.5.3
* openSUSE Leap Micro 5.3 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* openSUSE Leap Micro 5.4 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* openSUSE Leap 15.5 (x86_64)
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libodbc2-32bit-debuginfo-2.3.9-150400.16.5.3
* unixODBC-32bit-2.3.9-150400.16.5.3
* libssh2-1-32bit-debuginfo-1.11.0-150000.4.29.1
* unixODBC-devel-32bit-2.3.9-150400.16.5.3
* unixODBC-32bit-debuginfo-2.3.9-150400.16.5.3
* libtool-32bit-2.4.6-150000.3.6.2
* libodbc2-32bit-2.3.9-150400.16.5.3
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* Basesystem Module 15-SP5 (x86_64)
* libssh2-1-32bit-1.11.0-150000.4.29.1
* unixODBC-32bit-2.3.9-150400.16.5.3
* libltdl7-32bit-2.4.6-150000.3.6.2
* Development Tools Module 15-SP5 (x86_64)
* libtool-32bit-2.4.6-150000.3.6.2
* SUSE Package Hub 15 15-SP5 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libssh2-1-32bit-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libtool-32bit-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libtool-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libtool-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* libtool-32bit-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* unixODBC-devel-2.3.9-150400.16.5.3
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libssh2-1-32bit-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libtool-32bit-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libtool-32bit-2.4.6-150000.3.6.2
* unixODBC-32bit-2.3.9-150400.16.5.3
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libssh2-1-32bit-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libtool-32bit-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libtool-32bit-2.4.6-150000.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* unixODBC-2.3.9-150400.16.5.3
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* unixODBC-debuginfo-2.3.9-150400.16.5.3
* libodbc2-2.3.9-150400.16.5.3
* libssh2-devel-1.11.0-150000.4.29.1
* unixODBC-debugsource-2.3.9-150400.16.5.3
* libtool-2.4.6-150000.3.6.2
* unixODBC-devel-2.3.9-150400.16.5.3
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libodbc2-debuginfo-2.3.9-150400.16.5.3
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-devel-1.11.0-150000.4.29.1
* libtool-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libssh2-1-32bit-1.11.0-150000.4.29.1
* libltdl7-32bit-debuginfo-2.4.6-150000.3.6.2
* libtool-32bit-2.4.6-150000.3.6.2
* libltdl7-32bit-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libssh2_org-debugsource-1.11.0-150000.4.29.1
* libssh2-1-1.11.0-150000.4.29.1
* libssh2-1-debuginfo-1.11.0-150000.4.29.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* libtool-debugsource-2.4.6-150000.3.6.2
* libltdl7-2.4.6-150000.3.6.2
* libltdl7-debuginfo-2.4.6-150000.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221622
* https://bugzilla.suse.com/show_bug.cgi?id=1221941
1
0
18 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1322-2
Rating: important
References:
* bsc#1194869
* bsc#1200465
* bsc#1205316
* bsc#1207948
* bsc#1209635
* bsc#1209657
* bsc#1212514
* bsc#1213456
* bsc#1214852
* bsc#1215221
* bsc#1215322
* bsc#1217339
* bsc#1217959
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1218321
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1218643
* bsc#1218777
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1219834
* bsc#1220114
* bsc#1220176
* bsc#1220237
* bsc#1220251
* bsc#1220320
* bsc#1220325
* bsc#1220328
* bsc#1220337
* bsc#1220340
* bsc#1220365
* bsc#1220366
* bsc#1220398
* bsc#1220411
* bsc#1220413
* bsc#1220433
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220469
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220492
* bsc#1220703
* bsc#1220735
* bsc#1220736
* bsc#1220775
* bsc#1220790
* bsc#1220797
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220845
* bsc#1220848
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220883
* bsc#1220885
* bsc#1220887
* bsc#1220898
* bsc#1220917
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220930
* bsc#1220931
* bsc#1220932
* bsc#1220933
* bsc#1220937
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221044
* bsc#1221045
* bsc#1221046
* bsc#1221048
* bsc#1221055
* bsc#1221056
* bsc#1221058
* bsc#1221060
* bsc#1221061
* bsc#1221062
* bsc#1221066
* bsc#1221067
* bsc#1221068
* bsc#1221069
* bsc#1221070
* bsc#1221071
* bsc#1221077
* bsc#1221082
* bsc#1221090
* bsc#1221097
* bsc#1221156
* bsc#1221252
* bsc#1221273
* bsc#1221274
* bsc#1221276
* bsc#1221277
* bsc#1221291
* bsc#1221293
* bsc#1221298
* bsc#1221337
* bsc#1221338
* bsc#1221375
* bsc#1221379
* bsc#1221551
* bsc#1221553
* bsc#1221613
* bsc#1221614
* bsc#1221616
* bsc#1221618
* bsc#1221631
* bsc#1221633
* bsc#1221713
* bsc#1221725
* bsc#1221777
* bsc#1221814
* bsc#1221816
* bsc#1221830
* bsc#1221951
* bsc#1222033
* bsc#1222056
* bsc#1222060
* bsc#1222070
* bsc#1222073
* bsc#1222117
* bsc#1222274
* bsc#1222291
* bsc#1222300
* bsc#1222304
* bsc#1222317
* bsc#1222331
* bsc#1222355
* bsc#1222356
* bsc#1222360
* bsc#1222366
* bsc#1222373
* bsc#1222619
* jsc#PED-5759
* jsc#PED-7167
* jsc#PED-7618
* jsc#PED-7619
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46934
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47083
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-4744
* CVE-2022-48626
* CVE-2022-48627
* CVE-2022-48628
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-0160
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-4881
* CVE-2023-52447
* CVE-2023-52450
* CVE-2023-52453
* CVE-2023-52454
* CVE-2023-52462
* CVE-2023-52463
* CVE-2023-52467
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52476
* CVE-2023-52477
* CVE-2023-52481
* CVE-2023-52482
* CVE-2023-52484
* CVE-2023-52486
* CVE-2023-52492
* CVE-2023-52493
* CVE-2023-52494
* CVE-2023-52497
* CVE-2023-52500
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52518
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52530
* CVE-2023-52531
* CVE-2023-52532
* CVE-2023-52559
* CVE-2023-52563
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52587
* CVE-2023-52591
* CVE-2023-52594
* CVE-2023-52595
* CVE-2023-52597
* CVE-2023-52598
* CVE-2023-52599
* CVE-2023-52600
* CVE-2023-52601
* CVE-2023-52602
* CVE-2023-52603
* CVE-2023-52604
* CVE-2023-52605
* CVE-2023-52606
* CVE-2023-52607
* CVE-2023-52608
* CVE-2023-52612
* CVE-2023-52615
* CVE-2023-52617
* CVE-2023-52619
* CVE-2023-52621
* CVE-2023-52623
* CVE-2023-52628
* CVE-2023-52632
* CVE-2023-52637
* CVE-2023-52639
* CVE-2023-6270
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-25739
* CVE-2024-25742
* CVE-2024-26599
* CVE-2024-26600
* CVE-2024-26602
* CVE-2024-26607
* CVE-2024-26612
* CVE-2024-26614
* CVE-2024-26620
* CVE-2024-26627
* CVE-2024-26629
* CVE-2024-26642
* CVE-2024-26645
* CVE-2024-26646
* CVE-2024-26651
* CVE-2024-26654
* CVE-2024-26659
* CVE-2024-26664
* CVE-2024-26667
* CVE-2024-26670
* CVE-2024-26695
* CVE-2024-26717
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46934 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48628 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52462 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52462 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52467 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52467 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-52484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52494 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26599 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26599 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26629 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26646 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5
An update that solves 149 vulnerabilities, contains four features and has 29
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
NOTE: This update has been retracted due to a bug in the BHI CPU sidechannel
mitigation, which led to incorrect selection of other CPU mitigations.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46934: Fixed a bug by validating user data in compat ioctl
(bsc#1220469).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek:
(bsc#1220917).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2022-4744: Fixed double-free that could lead to DoS or privilege
escalation in TUN/TAP device driver functionality (bsc#1209635).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer
(bsc#1220845).
* CVE-2022-48628: Fixed possible lock in ceph (bsc#1220848).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52462: Fixed check for attempt to corrupt spilled pointer
(bsc#1220325).
* CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
* CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register
(bsc#1220433).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520
(bsc#1220887).
* CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors
(bsc#1220735).
* CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).
* CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
* CVE-2023-52494: Fixed missing alignment check for event ring read pointer in
bus/mhi/host (bsc#1221273).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).
* CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend
(bsc#1220933).
* CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson
(bsc#1220937).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).
* CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).
* CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs
(bsc#1221062).
* CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
* CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs
(bsc#1221068).
* CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs
(bsc#1221070).
* CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot()
(bsc#1221066).
* CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree()
(bsc#1221067).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib
(bsc#1221069).
* CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi
(bsc#1221375).
* CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
(bsc#1221616).
* CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
* CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove
(bsc#1221613).
* CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
number in pstore/ram (bsc#1221618).
* CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
* CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd
(bsc#1222274).
* CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939
(bsc#1222291).
* CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed
(bsc#1222300).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate()
(bsc#1220365).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
* CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences
(bsc#1221291).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap
(bsc#1221298).
* CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
* CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in
nfsd (bsc#1221379).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26645: Fixed missing visibility when inserting an element into
tracing_map (bsc#1222056).
* CVE-2024-26646: Fixed potential memory corruption when resuming from suspend
or hibernation in thermal/intel/hfi (bsc#1222070).
* CVE-2024-26651: Fixed possible oops via malicious devices in sr9800
(bsc#1221337).
* CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
* CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
events in xhci (bsc#1222317).
* CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in
hwmon coretemp (bsc#1222355).
* CVE-2024-26667: Fixed null pointer reference in
dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
* CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in
kernel arm64 (bsc#1222356).
* CVE-2024-26695: Fixed null pointer dereference in
__sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
* CVE-2024-26717: Fixed null pointer dereference on failed power up in HID
i2c-hid-of (bsc#1222360).
The following non-security bugs were fixed:
* acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-
fixes).
* acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-
fixes).
* acpi: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-
fixes).
* acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* acpi: scan: Fix device check notification handling (git-fixes).
* acpica: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
* alsa: aoa: avoid false-positive format truncation warning (git-fixes).
* alsa: aw2: avoid casting function pointers (git-fixes).
* alsa: ctxfi: avoid casting function pointers (git-fixes).
* alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-
fixes).
* alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-
fixes).
* alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897
platform (git-fixes).
* alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
* alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
* alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
* alsa: seq: fix function cast warnings (git-fixes).
* alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* alsa: usb-audio: Stop parsing channels bits when all channels are found
(git-fixes).
* arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-
fixes)
* arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
* arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
* arm64: mm: fix VA-range sanity check (git-fixes)
* arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
* asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
(stable-fixes).
* asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
* asoc: amd: acp: fix for acp_init function error handling (git-fixes).
* asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
* asoc: meson: Use dev_err_probe() helper (stable-fixes).
* asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
* asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
* asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
* asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
* asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
* asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* asoc: rt5682-sdw: fix locking sequence (git-fixes).
* asoc: rt711-sdca: fix locking sequence (git-fixes).
* asoc: rt711-sdw: fix locking sequence (git-fixes).
* asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-
fixes).
* asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
* asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-
fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* backlight: da9052: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-
fixes).
* backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
* backlight: lm3639: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lp8788: Fully initialize backlight_properties during probe (git-
fixes).
* blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
* bluetooth: Remove HCI_POWER_OFF_TIMEOUT (git-fixes).
* bluetooth: Remove superfluous call to hci_conn_check_pending() (git-fixes).
* bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
* bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
* bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-
fixes).
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
* can: softing: remove redundant NULL check (git-fixes).
* clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-
fixes).
* comedi: comedi_test: Prevent timers rescheduling during deletion (git-
fixes).
* coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
* coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
* coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus
(bsc#1220775)
* cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf()
(git-fixes).
* cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value
(git-fixes).
* crypto: arm/sha - fix function cast warnings (git-fixes).
* crypto: qat - avoid division by zero (git-fixes).
* crypto: qat - fix deadlock in backlog processing (git-fixes).
* crypto: qat - fix double free during reset (git-fixes).
* crypto: qat - fix state machines cleanup paths (bsc#1218321).
* crypto: qat - fix unregistration of compression algorithms (git-fixes).
* crypto: qat - fix unregistration of crypto algorithms (git-fixes).
* crypto: qat - ignore subsequent state up commands (git-fixes).
* crypto: qat - increase size of buffers (git-fixes).
* crypto: qat - resolve race condition during AER recovery (git-fixes).
* crypto: xilinx - call finalize with bh disabled (git-fixes).
* doc-guide: kernel-doc: tell about object-like macros (git-fixes).
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* drivers: hv: vmbus: Calculate ring buffer size for more efficient use of
memory (git-fixes).
* drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
* drm/amd/display: Add function for validate and update new stream (git-
fixes).
* drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
* drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-
fixes).
* drm/amd/display: Check if link state is valid (git-fixes).
* drm/amd/display: Copy DC context in the commit streams (git-fixes).
* drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
* drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
* drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
* drm/amd/display: Exit idle optimizations before attempt to access PHY (git-
fixes).
* drm/amd/display: Expand kernel doc for DC (git-fixes).
* drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
* drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
(git-fixes).
* drm/amd/display: Fix possible underflow for displays with large vblank (git-
fixes).
* drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
* drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
* drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-
fixes).
* drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-
fixes).
* drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
* drm/amd/display: Handle seamless boot stream (git-fixes).
* drm/amd/display: Handle virtual hardware detect (git-fixes).
* drm/amd/display: Include surface of unaffected streams (git-fixes).
* drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
* drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml
(git-fixes).
* drm/amd/display: Keep PHY active for dp config (git-fixes).
* drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
* drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
* drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Revert vblank change that causes null pointer crash (git-
fixes).
* drm/amd/display: Rework comments on dc file (git-fixes).
* drm/amd/display: Rework context change check (git-fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-
fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-
fixes).
* drm/amd/display: Update OTG instance in the commit stream (git-fixes).
* drm/amd/display: Update correct DCN314 register header (git-fixes).
* drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-
fixes).
* drm/amd/display: Use DRAM speed from validation for dummy p-state (git-
fixes).
* drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
* drm/amd/display: Use min transition for all SubVP plane add/remove (git-
fixes).
* drm/amd/display: Write to correct dirty_rect (git-fixes).
* drm/amd/display: Wrong colorimetry workaround (git-fixes).
* drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
* drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
* drm/amd/display: always switch off ODM before committing more streams (git-
fixes).
* drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-
fixes).
* drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
* drm/amd/display: ensure async flips are only accepted for fast updates (git-
fixes).
* drm/amd/display: fix ABM disablement (git-fixes).
* drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()
(git-fixes).
* drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
* drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
* drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
* drm/amd/display: fix unbounded requesting for high pixel rate modes on
dcn315 (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: perform a bounds check before filling dirty rectangles
(git-fixes).
* drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
* drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
* drm/amd/display: use low clocks for no plane configs (git-fixes).
* drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
* drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
* drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock
(git-fixes).
* drm/amd: Enable PCIe PME from D3 (git-fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
* drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
* drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int()
(git-fixes).
* drm/amdgpu: Force order between a read and write to the same address (git-
fixes).
* drm/amdgpu: Match against exact bootloader status (git-fixes).
* drm/amdgpu: Unset context priority is now invalid (git-fixes).
* drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: lower CS errors to debug severity (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
* drm/display: fix typo (git-fixes).
* drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
* drm/etnaviv: Restore some id values (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/exynos: fix a possible null-pointer dereference due to data race in
exynos_drm_crtc_atomic_disable() (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
* drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
* drm/i915: Add missing CCS documentation (git-fixes).
* drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled
(git-fixes).
* drm/i915: Check before removing mm notifier (git-fixes).
* drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
* drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
(git-fixes).
* drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
* drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-
fixes).
* drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
* drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
* drm/msm/dpu: improve DSC allocation (git-fixes).
* drm/panel-edp: use put_sync in unprepare (git-fixes).
* drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-
fixes).
* drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
* drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-
fixes).
* drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
* drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
* drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
* drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
* drm/rockchip: lvds: do not overwrite error code (git-fixes).
* drm/rockchip: lvds: do not print scary message when probing defer (git-
fixes).
* drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-
fixes).
* drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
* drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path
of tegra_dsi_probe() (git-fixes).
* drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-
fixes).
* drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-
fixes).
* drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
* drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-
fixes).
* drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths
of tegra_output_probe() (git-fixes).
* drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
* drm/tegra: rgb: Fix missing clk_put() in the error handling paths of
tegra_dc_rgb_probe() (git-fixes).
* drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-
fixes).
* drm/tidss: Fix initial plane zpos values (git-fixes).
* drm/tidss: Fix sync-lost issue with two displays (git-fixes).
* drm/ttm: Do not leak a resource on eviction error (git-fixes).
* drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
* drm/vc4: Add module dependency on hdmi-codec (git-fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-
fixes).
* drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
* drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017)
(git-fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* fix "coresight: etm4x: Change etm4_platform_driver driver for MMIO devices"
(bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to
another function.
* hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
* hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
* hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-
fixes).
* hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-
fixes).
* hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-
fixes).
* i2c: aspeed: Fix the dummy irq expected print (git-fixes).
* i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-
fixes).
* i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
* ib/ipoib: Fix mcast list locking (git-fixes)
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
* input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).
* input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).
* input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).
* input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).
* input: pm8941-pwrkey - add software key press debouncing support (git-
fixes).
* input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).
* input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
* input: xpad - add Lenovo Legion Go controllers (git-fixes).
* iommu/amd: Mark interrupt as managed (git-fixes).
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-
fixes).
* iommu/mediatek: Fix forever loop in error handling (git-fixes).
* iommu/vt-d: Allow to use flush-queue when first level is default (git-
fixes).
* iommu/vt-d: Do not issue ATS Invalidation request when device is
disconnected (git-fixes).
* iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
* iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
* kabi: PCI: Add locking to RMW PCI Express Capability Register accessors
(kabi).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
* lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is
detected (git-commit).
* leds: aw2013: Unlock mutex before destroying it (git-fixes).
* lib/cmdline: Fix an invalid format specifier in an assertion msg (git-
fixes).
* make NVIDIA Grace-Hopper TPM related drivers build-ins (bsc#1221156)
* md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
* md/raid5: release batch_last before waiting for another stripe_head (git-
fixes).
* md/raid6: use valid sector values to determine if an I/O should wait on the
reshape (git-fixes).
* md: Do not ignore suspended array in md_check_recovery() (git-fixes).
* md: Make sure md_do_sync() will set MD_RECOVERY_DONE (git-fixes).
* md: Whenassemble the array, consult the superblock of the freshest device
(git-fixes).
* md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly()
(git-fixes).
* md: fix data corruption for raid456 when reshape restart while grow up (git-
fixes).
* md: introduce md_ro_state (git-fixes).
* media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
* media: edia: dvbdev: fix a use-after-free (git-fixes).
* media: em28xx: annotate unchecked call to media_device_register() (git-
fixes).
* media: go7007: add check of return value of go7007_read_addr() (git-fixes).
* media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
* media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
* media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
* media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
* media: pvrusb2: remove redundant NULL check (git-fixes).
* media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-
fixes).
* media: sun8i-di: Fix chroma difference threshold (git-fixes).
* media: sun8i-di: Fix coefficient writes (git-fixes).
* media: sun8i-di: Fix power on/off sequences (git-fixes).
* media: tc358743: register v4l2 async device only after successful setup
(git-fixes).
* media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
* media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
* media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
* media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
* media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
* mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a
ref (git-fixes).
* mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref
(git-fixes).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Fix switch on gp3 partition (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
* mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
* mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
* mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove
function (git-fixes).
* mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
* mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
* mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
* net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* net: Fix features skip in for_each_netdev_feature() (git-fixes).
* net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfs: fix an off by one in root_nfs_cat() (git-fixes).
* nfs: rename nfs_client_kset to nfs_kset (git-fixes).
* nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* nfsd: convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
* nfsd: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
* nfsd: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
* nfsd: fix file memleak on client_opens_release (git-fixes).
* nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
* nfsd: lock_rename() needs both directories to live on the same fs (git-
fixes).
* nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* nfsd: retransmit callbacks after client reconnects (git-fixes).
* nfsd: use vfs setgid helper (git-fixes).
* nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
* nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
* nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nfsv4.2: fix wrong shrinker_id (git-fixes).
* nfsv4: fix a nfs4_state_manager() race (git-fixes).
* nfsv4: fix a state manager thread deadlock regression (git-fixes).
* nilfs2: fix failure to detect DAT corruption in btree and direct mappings
(git-fixes).
* nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
* pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
* pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
* pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
* pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
* pci: add locking to RMW PCI Express Capability Register accessors (git-
fixes).
* pci: dwc: Fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
* pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
* pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-
fixes).
* pci: fu740: Set the number of MSI vectors (git-fixes).
* pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-
fixes).
* pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
* pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
* pci: mediatek: Clear interrupt status before dispatching handler (git-
fixes).
* pci: qcom: Enable BDF to SID translation properly (git-fixes).
* pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-
fixes).
* pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
* pci: rockchip: Fix window mapping and address translation for endpoint (git-
fixes).
* pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
* pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-
fixes).
* pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-
fixes).
* platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
* pm: suspend: Set mem_sleep_current during kernel command line setup (git-
fixes).
* pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats
(git-fixes).
* pnfs: Fix a hang in nfs4_evict_inode() (git-fixes).
* pnfs: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
* powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
* powerpc/boot: Disable power10 features after BOOTAFLAGS assignment
(bsc#1194869).
* powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU
(bsc#1194869).
* powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses
(bsc#1194869).
* powerpc/lib/sstep: Remove unneeded #ifdef **powerpc64** (bsc#1194869).
* powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding
(bsc#1194869).
* powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465
ltc#197256 jsc#SLE-18130 git-fixes).
* powerpc/sstep: Use bitwise instead of arithmetic operator for flags
(bsc#1194869).
* powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
* pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-
fixes).
* qedf: Do not process stag work during unload (bsc#1214852).
* qedf: Wait for stag work during unload (bsc#1214852).
* raid1: fix use-after-free for original bio in raid1_write_request()
(bsc#1221097).
* ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
* ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
* ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
* ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
* ras/amd/fmpm: Save SPA values (jsc#PED-7619).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
* ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
* rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
* rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
* rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
* rdma/irdma: Remove duplicate assignment (git-fixes)
* rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
* rdma/mlx5: fix fortify source warning while accessing Eth segment (git-
fixes)
* rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
* rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-
fixes)
* rdma/srpt: do not register event handler until srpt device is fully setup
(git-fixes)
* revert "PCI: tegra194: Enable support for 256 Byte payload" (git-fixes).
* revert "Revert "drm/amdgpu/display: change pipe policy for DCN 2.0"" (git-
fixes).
* revert "SUNRPC dont update timeout value on connection reset" (git-fixes).
* revert "drm/amd: Disable PSR-SU on Parade 0803 TCON" (git-fixes).
* revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" (git-
fixes).
* revert "drm/amdgpu/display: change pipe policy for DCN 2.0" (git-fixes).
* revert "drm/amdgpu/display: change pipe policy for DCN 2.1" (git-fixes).
* revert "drm/vc4: hdmi: Enforce the minimum rate at runtime_resume" (git-
fixes).
* revert "fbdev: flush deferred IO before closing (git-fixes)." (bsc#1221814)
* ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes
bsc#1221633).
* s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
* s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
* s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
* sched/rt: Disallow writing invalid values to sched_rt_period_us
(bsc#1220176).
* sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
(bsc#1220176).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
* scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
* scsi: qedf: Remove unused declaration (bsc#1214852).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: storvsc: Fix ring buffer size calculation (git-fixes).
* scsi: target: core: Silence the message about unknown VPD pages
(bsc#1221252).
* selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* sr9800: Add check for usbnet_get_endpoints (git-fixes).
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
* sunrpc: ECONNRESET might require a rebind (git-fixes).
* sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
* sunrpc: Fix a suspicious RCU usage warning (git-fixes).
* sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
* sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
* svcrdma: Drop connection after an RDMA Read error (git-fixes).
* topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).
* topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).
* tracing/probes: Fix to show a parse error for bad type for $comm (git-
fixes).
* tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).
* tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
* tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-
fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
* usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
* usb: port: Do not try to peer unused USB ports based on location (git-
fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-
fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vt: fix unicode buffer corruption when deleting characters (git-fixes).
* watchdog: stm32_iwdg: initialize default timeout (git-fixes).
* wifi: ath10k: fix NULL pointer dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
* wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete
(git-fixes).
* wifi: b43: Disable QoS for bcm4331 (git-fixes).
* wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-
fixes).
* wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-
fixes).
* wifi: brcmsmac: avoid function pointer casts (git-fixes).
* wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
* wifi: iwlwifi: fix EWRD table validity check (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
* wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-
fixes).
* wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
* wifi: mwifiex: debugfs: Drop unnecessary error check for
debugfs_create_dir() (git-fixes).
* wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
* wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
* wifi: wilc1000: fix RCU usage in connect path (git-fixes).
* wifi: wilc1000: fix declarations ordering (stable-fixes).
* wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
* wifi: wilc1000: prevent use-after-free on vif when cleaning up all
interfaces (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
* xhci: process isoc TD properly when there was a transaction error mid TD
(git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1322=1 openSUSE-SLE-15.5-2024-1322=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1322=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1322=1
* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-1322=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.43.1
* kernel-source-rt-5.14.21-150500.13.43.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-vdso-5.14.21-150500.13.43.1
* gfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-5.14.21-150500.13.43.1
* kernel-livepatch-5_14_21-150500_13_43-rt-1-150500.11.5.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* kselftests-kmp-rt-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-livepatch-5.14.21-150500.13.43.1
* kernel-livepatch-5_14_21-150500_13_43-rt-debuginfo-1-150500.11.5.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-extra-5.14.21-150500.13.43.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.43.1
* kernel-syms-rt-5.14.21-150500.13.43.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.43.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-optional-5.14.21-150500.13.43.1
* kernel-rt-devel-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-5.14.21-150500.13.43.1
* kernel-livepatch-SLE15-SP5-RT_Update_12-debugsource-1-150500.11.5.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.43.1
* reiserfs-kmp-rt-5.14.21-150500.13.43.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.43.1
* kernel-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_12-debugsource-1-150500.11.5.1
* kernel-livepatch-5_14_21-150500_13_43-rt-debuginfo-1-150500.11.5.1
* kernel-livepatch-5_14_21-150500_13_43-rt-1-150500.11.5.1
* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt-vdso-5.14.21-150500.13.43.1
* gfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-syms-rt-5.14.21-150500.13.43.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-devel-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-5.14.21-150500.13.43.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.43.1
* kernel-source-rt-5.14.21-150500.13.43.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.43.1
* kernel-rt-5.14.21-150500.13.43.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46934.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47083.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-4744.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48627.html
* https://www.suse.com/security/cve/CVE-2022-48628.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52453.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52462.html
* https://www.suse.com/security/cve/CVE-2023-52463.html
* https://www.suse.com/security/cve/CVE-2023-52467.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52481.html
* https://www.suse.com/security/cve/CVE-2023-52482.html
* https://www.suse.com/security/cve/CVE-2023-52484.html
* https://www.suse.com/security/cve/CVE-2023-52486.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52493.html
* https://www.suse.com/security/cve/CVE-2023-52494.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52518.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52530.html
* https://www.suse.com/security/cve/CVE-2023-52531.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52559.html
* https://www.suse.com/security/cve/CVE-2023-52563.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52587.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52594.html
* https://www.suse.com/security/cve/CVE-2023-52595.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52598.html
* https://www.suse.com/security/cve/CVE-2023-52599.html
* https://www.suse.com/security/cve/CVE-2023-52600.html
* https://www.suse.com/security/cve/CVE-2023-52601.html
* https://www.suse.com/security/cve/CVE-2023-52602.html
* https://www.suse.com/security/cve/CVE-2023-52603.html
* https://www.suse.com/security/cve/CVE-2023-52604.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52606.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52608.html
* https://www.suse.com/security/cve/CVE-2023-52612.html
* https://www.suse.com/security/cve/CVE-2023-52615.html
* https://www.suse.com/security/cve/CVE-2023-52617.html
* https://www.suse.com/security/cve/CVE-2023-52619.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2023-52623.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-52632.html
* https://www.suse.com/security/cve/CVE-2023-52637.html
* https://www.suse.com/security/cve/CVE-2023-52639.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26599.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26607.html
* https://www.suse.com/security/cve/CVE-2024-26612.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26620.html
* https://www.suse.com/security/cve/CVE-2024-26627.html
* https://www.suse.com/security/cve/CVE-2024-26629.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26645.html
* https://www.suse.com/security/cve/CVE-2024-26646.html
* https://www.suse.com/security/cve/CVE-2024-26651.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26659.html
* https://www.suse.com/security/cve/CVE-2024-26664.html
* https://www.suse.com/security/cve/CVE-2024-26667.html
* https://www.suse.com/security/cve/CVE-2024-26670.html
* https://www.suse.com/security/cve/CVE-2024-26695.html
* https://www.suse.com/security/cve/CVE-2024-26717.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1209635
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1218321
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218643
* https://bugzilla.suse.com/show_bug.cgi?id=1218777
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220114
* https://bugzilla.suse.com/show_bug.cgi?id=1220176
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220325
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220337
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220365
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220433
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220469
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220735
* https://bugzilla.suse.com/show_bug.cgi?id=1220736
* https://bugzilla.suse.com/show_bug.cgi?id=1220775
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220797
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220845
* https://bugzilla.suse.com/show_bug.cgi?id=1220848
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220887
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220917
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220930
* https://bugzilla.suse.com/show_bug.cgi?id=1220931
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220933
* https://bugzilla.suse.com/show_bug.cgi?id=1220937
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221045
* https://bugzilla.suse.com/show_bug.cgi?id=1221046
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221056
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221060
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221062
* https://bugzilla.suse.com/show_bug.cgi?id=1221066
* https://bugzilla.suse.com/show_bug.cgi?id=1221067
* https://bugzilla.suse.com/show_bug.cgi?id=1221068
* https://bugzilla.suse.com/show_bug.cgi?id=1221069
* https://bugzilla.suse.com/show_bug.cgi?id=1221070
* https://bugzilla.suse.com/show_bug.cgi?id=1221071
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221082
* https://bugzilla.suse.com/show_bug.cgi?id=1221090
* https://bugzilla.suse.com/show_bug.cgi?id=1221097
* https://bugzilla.suse.com/show_bug.cgi?id=1221156
* https://bugzilla.suse.com/show_bug.cgi?id=1221252
* https://bugzilla.suse.com/show_bug.cgi?id=1221273
* https://bugzilla.suse.com/show_bug.cgi?id=1221274
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221277
* https://bugzilla.suse.com/show_bug.cgi?id=1221291
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221298
* https://bugzilla.suse.com/show_bug.cgi?id=1221337
* https://bugzilla.suse.com/show_bug.cgi?id=1221338
* https://bugzilla.suse.com/show_bug.cgi?id=1221375
* https://bugzilla.suse.com/show_bug.cgi?id=1221379
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221613
* https://bugzilla.suse.com/show_bug.cgi?id=1221614
* https://bugzilla.suse.com/show_bug.cgi?id=1221616
* https://bugzilla.suse.com/show_bug.cgi?id=1221618
* https://bugzilla.suse.com/show_bug.cgi?id=1221631
* https://bugzilla.suse.com/show_bug.cgi?id=1221633
* https://bugzilla.suse.com/show_bug.cgi?id=1221713
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221814
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221951
* https://bugzilla.suse.com/show_bug.cgi?id=1222033
* https://bugzilla.suse.com/show_bug.cgi?id=1222056
* https://bugzilla.suse.com/show_bug.cgi?id=1222060
* https://bugzilla.suse.com/show_bug.cgi?id=1222070
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222274
* https://bugzilla.suse.com/show_bug.cgi?id=1222291
* https://bugzilla.suse.com/show_bug.cgi?id=1222300
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222317
* https://bugzilla.suse.com/show_bug.cgi?id=1222331
* https://bugzilla.suse.com/show_bug.cgi?id=1222355
* https://bugzilla.suse.com/show_bug.cgi?id=1222356
* https://bugzilla.suse.com/show_bug.cgi?id=1222360
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222373
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-7618
* https://jira.suse.com/browse/PED-7619
1
0
18 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1332-1
Rating: important
References:
* bsc#1194869
* bsc#1200465
* bsc#1205316
* bsc#1207948
* bsc#1209635
* bsc#1209657
* bsc#1212514
* bsc#1213456
* bsc#1214852
* bsc#1215221
* bsc#1215322
* bsc#1217339
* bsc#1217959
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1218321
* bsc#1218336
* bsc#1218479
* bsc#1218643
* bsc#1218777
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1219834
* bsc#1220114
* bsc#1220176
* bsc#1220237
* bsc#1220251
* bsc#1220320
* bsc#1220337
* bsc#1220340
* bsc#1220365
* bsc#1220366
* bsc#1220398
* bsc#1220411
* bsc#1220413
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220492
* bsc#1220703
* bsc#1220775
* bsc#1220790
* bsc#1220797
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220883
* bsc#1220885
* bsc#1220887
* bsc#1220898
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220932
* bsc#1220937
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221044
* bsc#1221045
* bsc#1221046
* bsc#1221048
* bsc#1221055
* bsc#1221056
* bsc#1221058
* bsc#1221060
* bsc#1221061
* bsc#1221062
* bsc#1221066
* bsc#1221067
* bsc#1221068
* bsc#1221069
* bsc#1221070
* bsc#1221071
* bsc#1221077
* bsc#1221082
* bsc#1221090
* bsc#1221097
* bsc#1221156
* bsc#1221252
* bsc#1221273
* bsc#1221274
* bsc#1221276
* bsc#1221277
* bsc#1221291
* bsc#1221293
* bsc#1221298
* bsc#1221337
* bsc#1221338
* bsc#1221375
* bsc#1221379
* bsc#1221551
* bsc#1221553
* bsc#1221613
* bsc#1221614
* bsc#1221616
* bsc#1221618
* bsc#1221631
* bsc#1221633
* bsc#1221713
* bsc#1221777
* bsc#1221814
* bsc#1221816
* bsc#1221830
* bsc#1221951
* bsc#1222033
* bsc#1222056
* bsc#1222060
* bsc#1222070
* bsc#1222073
* bsc#1222117
* bsc#1222274
* bsc#1222291
* bsc#1222300
* bsc#1222304
* bsc#1222317
* bsc#1222331
* bsc#1222355
* bsc#1222356
* bsc#1222360
* bsc#1222366
* bsc#1222373
* bsc#1222619
* jsc#PED-5759
* jsc#PED-7167
* jsc#PED-7619
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-4744
* CVE-2022-48626
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-0160
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-4881
* CVE-2023-52447
* CVE-2023-52450
* CVE-2023-52453
* CVE-2023-52454
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52476
* CVE-2023-52477
* CVE-2023-52481
* CVE-2023-52484
* CVE-2023-52486
* CVE-2023-52492
* CVE-2023-52493
* CVE-2023-52494
* CVE-2023-52497
* CVE-2023-52500
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52518
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52532
* CVE-2023-52563
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52587
* CVE-2023-52591
* CVE-2023-52594
* CVE-2023-52595
* CVE-2023-52597
* CVE-2023-52598
* CVE-2023-52599
* CVE-2023-52600
* CVE-2023-52601
* CVE-2023-52602
* CVE-2023-52603
* CVE-2023-52604
* CVE-2023-52605
* CVE-2023-52606
* CVE-2023-52607
* CVE-2023-52608
* CVE-2023-52612
* CVE-2023-52615
* CVE-2023-52617
* CVE-2023-52619
* CVE-2023-52621
* CVE-2023-52623
* CVE-2023-52628
* CVE-2023-52632
* CVE-2023-52637
* CVE-2023-52639
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-25739
* CVE-2024-26599
* CVE-2024-26600
* CVE-2024-26602
* CVE-2024-26612
* CVE-2024-26614
* CVE-2024-26620
* CVE-2024-26627
* CVE-2024-26629
* CVE-2024-26642
* CVE-2024-26645
* CVE-2024-26646
* CVE-2024-26651
* CVE-2024-26654
* CVE-2024-26659
* CVE-2024-26664
* CVE-2024-26667
* CVE-2024-26670
* CVE-2024-26695
* CVE-2024-26717
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52494 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26599 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26599 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26629 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26646 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 135 vulnerabilities, contains three features and has 29
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2022-4744: Fixed double-free that could lead to DoS or privilege
escalation in TUN/TAP device driver functionality (bsc#1209635).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520
(bsc#1220887).
* CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).
* CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
* CVE-2023-52494: Fixed missing alignment check for event ring read pointer in
bus/mhi/host (bsc#1221273).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson
(bsc#1220937).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).
* CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).
* CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs
(bsc#1221062).
* CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
* CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs
(bsc#1221068).
* CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs
(bsc#1221070).
* CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot()
(bsc#1221066).
* CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree()
(bsc#1221067).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib
(bsc#1221069).
* CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi
(bsc#1221375).
* CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
(bsc#1221616).
* CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
* CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove
(bsc#1221613).
* CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
number in pstore/ram (bsc#1221618).
* CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
* CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd
(bsc#1222274).
* CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939
(bsc#1222291).
* CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed
(bsc#1222300).
* CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-0841: Fixed null pointer dereference in hugetlbfs_fill_super()
(bsc#1219264).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate()
(bsc#1220365).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences
(bsc#1221291).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap
(bsc#1221298).
* CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
* CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in
nfsd (bsc#1221379).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26645: Fixed missing visibility when inserting an element into
tracing_map (bsc#1222056).
* CVE-2024-26646: Fixed potential memory corruption when resuming from suspend
or hibernation in thermal/intel/hfi (bsc#1222070).
* CVE-2024-26651: Fixed possible oops via malicious devices in sr9800
(bsc#1221337).
* CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
* CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
events in xhci (bsc#1222317).
* CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in
hwmon coretemp (bsc#1222355).
* CVE-2024-26667: Fixed null pointer reference in
dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
* CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in
kernel arm64 (bsc#1222356).
* CVE-2024-26695: Fixed null pointer dereference in
__sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
* CVE-2024-26717: Fixed null pointer dereference on failed power up in HID
i2c-hid-of (bsc#1222360).
The following non-security bugs were fixed:
* Revert "PCI: tegra194: Enable support for 256 Byte payload" (git-fixes).
* Revert "Revert "drm/amdgpu/display: change pipe policy for DCN 2.0"" (git-
fixes).
* Revert "SUNRPC dont update timeout value on connection reset" (git-fixes).
* Revert "drm/amd: Disable PSR-SU on Parade 0803 TCON" (git-fixes).
* Revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" (git-
fixes).
* Revert "drm/amdgpu/display: change pipe policy for DCN 2.0" (git-fixes).
* Revert "drm/amdgpu/display: change pipe policy for DCN 2.1" (git-fixes).
* Revert "drm/vc4: hdmi: Enforce the minimum rate at runtime_resume" (git-
fixes).
* Revert "fbdev: flush deferred IO before closing (git-fixes)." (bsc#1221814)
* acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-
fixes).
* acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-
fixes).
* acpi: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-
fixes).
* acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* acpi: scan: Fix device check notification handling (git-fixes).
* acpica: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
* alsa: aoa: avoid false-positive format truncation warning (git-fixes).
* alsa: aw2: avoid casting function pointers (git-fixes).
* alsa: ctxfi: avoid casting function pointers (git-fixes).
* alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-
fixes).
* alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-
fixes).
* alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897
platform (git-fixes).
* alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
* alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
* alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
* alsa: seq: fix function cast warnings (git-fixes).
* alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* alsa: usb-audio: Stop parsing channels bits when all channels are found
(git-fixes).
* arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-
fixes)
* arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
* arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
* arm64: mm: fix VA-range sanity check (git-fixes)
* arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
* asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
(stable-fixes).
* asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
* asoc: amd: acp: fix for acp_init function error handling (git-fixes).
* asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
* asoc: meson: Use dev_err_probe() helper (stable-fixes).
* asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
* asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
* asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
* asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
* asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
* asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* asoc: rt5682-sdw: fix locking sequence (git-fixes).
* asoc: rt711-sdca: fix locking sequence (git-fixes).
* asoc: rt711-sdw: fix locking sequence (git-fixes).
* asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-
fixes).
* asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
* asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-
fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* backlight: da9052: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-
fixes).
* backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
* backlight: lm3639: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lp8788: Fully initialize backlight_properties during probe (git-
fixes).
* blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
* bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
* bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
* bluetooth: remove HCI_POWER_OFF_TIMEOUT (git-fixes).
* bluetooth: remove superfluous call to hci_conn_check_pending() (git-fixes).
* bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-
fixes).
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
* can: softing: remove redundant NULL check (git-fixes).
* clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-
fixes).
* comedi: comedi_test: Prevent timers rescheduling during deletion (git-
fixes).
* coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
* coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
* coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus
(bsc#1220775)
* cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf()
(git-fixes).
* cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value
(git-fixes).
* crypto: arm/sha - fix function cast warnings (git-fixes).
* crypto: qat - avoid division by zero (git-fixes).
* crypto: qat - fix deadlock in backlog processing (git-fixes).
* crypto: qat - fix double free during reset (git-fixes).
* crypto: qat - fix state machines cleanup paths (bsc#1218321).
* crypto: qat - fix unregistration of compression algorithms (git-fixes).
* crypto: qat - fix unregistration of crypto algorithms (git-fixes).
* crypto: qat - ignore subsequent state up commands (git-fixes).
* crypto: qat - increase size of buffers (git-fixes).
* crypto: qat - resolve race condition during AER recovery (git-fixes).
* crypto: xilinx - call finalize with bh disabled (git-fixes).
* doc-guide: kernel-doc: tell about object-like macros (git-fixes).
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* drivers: hv: vmbus: Calculate ring buffer size for more efficient use of
memory (git-fixes).
* drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
* drm/amd/display: Add function for validate and update new stream (git-
fixes).
* drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
* drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-
fixes).
* drm/amd/display: Check if link state is valid (git-fixes).
* drm/amd/display: Copy DC context in the commit streams (git-fixes).
* drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
* drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
* drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
* drm/amd/display: Exit idle optimizations before attempt to access PHY (git-
fixes).
* drm/amd/display: Expand kernel doc for DC (git-fixes).
* drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
* drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
(git-fixes).
* drm/amd/display: Fix possible underflow for displays with large vblank (git-
fixes).
* drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
* drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
* drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-
fixes).
* drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-
fixes).
* drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
* drm/amd/display: Handle seamless boot stream (git-fixes).
* drm/amd/display: Handle virtual hardware detect (git-fixes).
* drm/amd/display: Include surface of unaffected streams (git-fixes).
* drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
* drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml
(git-fixes).
* drm/amd/display: Keep PHY active for dp config (git-fixes).
* drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
* drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
* drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Revert vblank change that causes null pointer crash (git-
fixes).
* drm/amd/display: Rework comments on dc file (git-fixes).
* drm/amd/display: Rework context change check (git-fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-
fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-
fixes).
* drm/amd/display: Update OTG instance in the commit stream (git-fixes).
* drm/amd/display: Update correct DCN314 register header (git-fixes).
* drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-
fixes).
* drm/amd/display: Use DRAM speed from validation for dummy p-state (git-
fixes).
* drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
* drm/amd/display: Use min transition for all SubVP plane add/remove (git-
fixes).
* drm/amd/display: Write to correct dirty_rect (git-fixes).
* drm/amd/display: Wrong colorimetry workaround (git-fixes).
* drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
* drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
* drm/amd/display: always switch off ODM before committing more streams (git-
fixes).
* drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-
fixes).
* drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
* drm/amd/display: ensure async flips are only accepted for fast updates (git-
fixes).
* drm/amd/display: fix ABM disablement (git-fixes).
* drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()
(git-fixes).
* drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
* drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
* drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
* drm/amd/display: fix unbounded requesting for high pixel rate modes on
dcn315 (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: perform a bounds check before filling dirty rectangles
(git-fixes).
* drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
* drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
* drm/amd/display: use low clocks for no plane configs (git-fixes).
* drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
* drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
* drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock
(git-fixes).
* drm/amd: Enable PCIe PME from D3 (git-fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
* drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
* drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int()
(git-fixes).
* drm/amdgpu: Force order between a read and write to the same address (git-
fixes).
* drm/amdgpu: Match against exact bootloader status (git-fixes).
* drm/amdgpu: Unset context priority is now invalid (git-fixes).
* drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: lower CS errors to debug severity (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
* drm/display: fix typo (git-fixes).
* drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
* drm/etnaviv: Restore some id values (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/exynos: fix a possible null-pointer dereference due to data race in
exynos_drm_crtc_atomic_disable() (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
* drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
* drm/i915: Add missing CCS documentation (git-fixes).
* drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled
(git-fixes).
* drm/i915: Check before removing mm notifier (git-fixes).
* drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
* drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
(git-fixes).
* drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
* drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-
fixes).
* drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
* drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
* drm/msm/dpu: improve DSC allocation (git-fixes).
* drm/panel-edp: use put_sync in unprepare (git-fixes).
* drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-
fixes).
* drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
* drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-
fixes).
* drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
* drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
* drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
* drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
* drm/rockchip: lvds: do not overwrite error code (git-fixes).
* drm/rockchip: lvds: do not print scary message when probing defer (git-
fixes).
* drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-
fixes).
* drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
* drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path
of tegra_dsi_probe() (git-fixes).
* drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-
fixes).
* drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-
fixes).
* drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
* drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-
fixes).
* drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths
of tegra_output_probe() (git-fixes).
* drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
* drm/tegra: rgb: Fix missing clk_put() in the error handling paths of
tegra_dc_rgb_probe() (git-fixes).
* drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-
fixes).
* drm/tidss: Fix initial plane zpos values (git-fixes).
* drm/tidss: Fix sync-lost issue with two displays (git-fixes).
* drm/ttm: Do not leak a resource on eviction error (git-fixes).
* drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
* drm/vc4: Add module dependency on hdmi-codec (git-fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-
fixes).
* drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
* drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017)
(git-fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* fix "coresight: etm4x: Change etm4_platform_driver driver for MMIO devices"
(bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to
another function.
* force config_TCG_TIS_CORE=m on aarch64 for workaround kconfig issues
* group-source-files.pl: Quote filenames (boo#1221077). The kernel source now
contains a file with a space in the name. Add quotes in group-source-
files.pl to avoid splitting the filename. Also use -print0 / -0 when
updating timestamps.
* hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
* hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
* hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-
fixes).
* hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-
fixes).
* hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-
fixes).
* i2c: aspeed: Fix the dummy irq expected print (git-fixes).
* i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-
fixes).
* i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
* ib/ipoib: fix mcast list locking (git-fixes)
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
* input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
* iommu/amd: Mark interrupt as managed (git-fixes).
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-
fixes).
* iommu/mediatek: Fix forever loop in error handling (git-fixes).
* iommu/vt-d: Allow to use flush-queue when first level is default (git-
fixes).
* iommu/vt-d: Do not issue ATS Invalidation request when device is
disconnected (git-fixes).
* iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
* iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
* kABI: PCI: Add locking to RMW PCI Express Capability Register accessors
(kabi).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kernel-binary: Fix i386 build Fixes: 89eaf4cdce05 ("rpm templates: Move
macro definitions below buildrequires")
* kernel-binary: Move build script to the end All other spec templates have
the build script at the end, only kernel-binary has it in the middle. Align
with the other templates.
* kernel-binary: certs: Avoid trailing space
* kernel-binary: vdso: fix filelist for non-usrmerged kernel Fixes:
a6ad8af207e6 ("rpm templates: Always define usrmerged")
* kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
* leds: aw2013: Unlock mutex before destroying it (git-fixes).
* lib/cmdline: Fix an invalid format specifier in an assertion msg (git-
fixes).
* make nvidia Grace-Hopper TPM related drivers build-ins (bsc#1221156)
* md: fix data corruption for raid456 when reshape restart while grow up (git-
fixes).
* media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
* media: edia: dvbdev: fix a use-after-free (git-fixes).
* media: em28xx: annotate unchecked call to media_device_register() (git-
fixes).
* media: go7007: add check of return value of go7007_read_addr() (git-fixes).
* media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
* media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
* media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
* media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
* media: pvrusb2: remove redundant NULL check (git-fixes).
* media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-
fixes).
* media: sun8i-di: Fix chroma difference threshold (git-fixes).
* media: sun8i-di: Fix coefficient writes (git-fixes).
* media: sun8i-di: Fix power on/off sequences (git-fixes).
* media: tc358743: register v4l2 async device only after successful setup
(git-fixes).
* media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
* media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
* media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
* media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
* media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
* mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a
ref (git-fixes).
* mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref
(git-fixes).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Fix switch on gp3 partition (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
* mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
* mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
* mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove
function (git-fixes).
* mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
* mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
* mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
* net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* net: Fix features skip in for_each_netdev_feature() (git-fixes).
* net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfs: fix an off by one in root_nfs_cat() (git-fixes).
* nfs: rename nfs_client_kset to nfs_kset (git-fixes).
* nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* nfsd: convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
* nfsd: fix file memleak on client_opens_release (git-fixes).
* nfsd: fix liSTXATTRS returning a short list with eof=TRUE (git-fixes).
* nfsd: fix liSTXATTRS returning more bytes than maxcount (git-fixes).
* nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
* nfsd: lock_rename() needs both directories to live on the same fs (git-
fixes).
* nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* nfsd: retransmit callbacks after client reconnects (git-fixes).
* nfsd: use vfs setgid helper (git-fixes).
* nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
* nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
* nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nfsv4.2: fix wrong shrinker_id (git-fixes).
* nfsv4: fix a nfs4_state_manager() race (git-fixes).
* nfsv4: fix a state manager thread deadlock regression (git-fixes).
* nilfs2: fix failure to detect DAT corruption in btree and direct mappings
(git-fixes).
* nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats
(git-fixes).
* pNFS: Fix a hang in nfs4_evict_inode() (git-fixes).
* pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
* pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
* pci/aspm: use RMW accessors for changing LNKCTL (git-fixes).
* pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
* pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
* pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
* pci: add locking to RMW PCI Express Capability Register accessors (git-
fixes).
* pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
* pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-
fixes).
* pci: dwc: fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
* pci: fu740: Set the number of MSI vectors (git-fixes).
* pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-
fixes).
* pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
* pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
* pci: mediatek: Clear interrupt status before dispatching handler (git-
fixes).
* pci: qcom: enable BDF to SID translation properly (git-fixes).
* pci: qcom: use DWC helpers for modifying the read-only DBI registers (git-
fixes).
* pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
* pci: rockchip: Fix window mapping and address translation for endpoint (git-
fixes).
* pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
* pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-
fixes).
* pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-
fixes).
* platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
* pm: suspend: Set mem_sleep_current during kernel command line setup (git-
fixes).
* powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
* powerpc/boot: Disable power10 features after BOOTAFLAGS assignment
(bsc#1194869).
* powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU
(bsc#1194869).
* powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses
(bsc#1194869).
* powerpc/lib/sstep: Remove unneeded #ifdef **powerpc64** (bsc#1194869).
* powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding
(bsc#1194869).
* powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465
ltc#197256 jsc#SLE-18130 git-fixes).
* powerpc/sstep: Use bitwise instead of arithmetic operator for flags
(bsc#1194869).
* powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
* pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-
fixes).
* qedf: Do not process stag work during unload (bsc#1214852).
* qedf: Wait for stag work during unload (bsc#1214852).
* raid1: fix use-after-free for original bio in raid1_write_request()
(bsc#1221097).
* ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
* ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
* ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
* ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
* ras/amd/fmpm: Save SPA values (jsc#PED-7619).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
* ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
* rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
* rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
* rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
* rdma/irdma: Remove duplicate assignment (git-fixes)
* rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
* rdma/mlx5: fix fortify source warning while accessing Eth segment (git-
fixes)
* rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
* rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-
fixes)
* rdma/srpt: do not register event handler until srpt device is fully setup
(git-fixes)
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes
bsc#1221633).
* s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
* s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
* s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
* sched/rt: Disallow writing invalid values to sched_rt_period_us
(bsc#1220176).
* sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
(bsc#1220176).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
* scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
* scsi: qedf: Remove unused declaration (bsc#1214852).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: storvsc: Fix ring buffer size calculation (git-fixes).
* scsi: target: core: Silence the message about unknown VPD pages
(bsc#1221252).
* selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* sr9800: Add check for usbnet_get_endpoints (git-fixes).
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
* sunrpc: ECONNRESET might require a rebind (git-fixes).
* sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
* sunrpc: Fix a suspicious RCU usage warning (git-fixes).
* sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
* sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
* svcrdma: Drop connection after an RDMA Read error (git-fixes).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
* tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-
fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: port: Do not try to peer unused USB ports based on location (git-
fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-
fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vt: fix unicode buffer corruption when deleting characters (git-fixes).
* watchdog: stm32_iwdg: initialize default timeout (git-fixes).
* wifi: ath10k: fix NULL pointer dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
* wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete
(git-fixes).
* wifi: b43: Disable QoS for bcm4331 (git-fixes).
* wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-
fixes).
* wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-
fixes).
* wifi: brcmsmac: avoid function pointer casts (git-fixes).
* wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
* wifi: iwlwifi: fix EWRD table validity check (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
* wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-
fixes).
* wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
* wifi: mwifiex: debugfs: Drop unnecessary error check for
debugfs_create_dir() (git-fixes).
* wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
* wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
* wifi: wilc1000: fix RCU usage in connect path (git-fixes).
* wifi: wilc1000: fix declarations ordering (stable-fixes).
* wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
* wifi: wilc1000: prevent use-after-free on vif when cleaning up all
interfaces (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
* xhci: process isoc TD properly when there was a transaction error mid TD
(git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1332=1 openSUSE-SLE-15.5-2024-1332=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1332=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* gfs2-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.42.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-optional-5.14.21-150500.33.42.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-debuginfo-5.14.21-150500.33.42.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kselftests-kmp-azure-5.14.21-150500.33.42.1
* kernel-syms-azure-5.14.21-150500.33.42.1
* reiserfs-kmp-azure-5.14.21-150500.33.42.1
* dlm-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.42.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-debugsource-5.14.21-150500.33.42.1
* cluster-md-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-devel-5.14.21-150500.33.42.1
* kernel-azure-extra-5.14.21-150500.33.42.1
* ocfs2-kmp-azure-5.14.21-150500.33.42.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-vdso-5.14.21-150500.33.42.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.42.1
* kernel-devel-azure-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-syms-azure-5.14.21-150500.33.42.1
* kernel-azure-debugsource-5.14.21-150500.33.42.1
* kernel-azure-debuginfo-5.14.21-150500.33.42.1
* kernel-azure-devel-5.14.21-150500.33.42.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.42.1
* kernel-devel-azure-5.14.21-150500.33.42.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-4744.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52453.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52481.html
* https://www.suse.com/security/cve/CVE-2023-52484.html
* https://www.suse.com/security/cve/CVE-2023-52486.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52493.html
* https://www.suse.com/security/cve/CVE-2023-52494.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52518.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52563.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52587.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52594.html
* https://www.suse.com/security/cve/CVE-2023-52595.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52598.html
* https://www.suse.com/security/cve/CVE-2023-52599.html
* https://www.suse.com/security/cve/CVE-2023-52600.html
* https://www.suse.com/security/cve/CVE-2023-52601.html
* https://www.suse.com/security/cve/CVE-2023-52602.html
* https://www.suse.com/security/cve/CVE-2023-52603.html
* https://www.suse.com/security/cve/CVE-2023-52604.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52606.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52608.html
* https://www.suse.com/security/cve/CVE-2023-52612.html
* https://www.suse.com/security/cve/CVE-2023-52615.html
* https://www.suse.com/security/cve/CVE-2023-52617.html
* https://www.suse.com/security/cve/CVE-2023-52619.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2023-52623.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-52632.html
* https://www.suse.com/security/cve/CVE-2023-52637.html
* https://www.suse.com/security/cve/CVE-2023-52639.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-26599.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26612.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26620.html
* https://www.suse.com/security/cve/CVE-2024-26627.html
* https://www.suse.com/security/cve/CVE-2024-26629.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26645.html
* https://www.suse.com/security/cve/CVE-2024-26646.html
* https://www.suse.com/security/cve/CVE-2024-26651.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26659.html
* https://www.suse.com/security/cve/CVE-2024-26664.html
* https://www.suse.com/security/cve/CVE-2024-26667.html
* https://www.suse.com/security/cve/CVE-2024-26670.html
* https://www.suse.com/security/cve/CVE-2024-26695.html
* https://www.suse.com/security/cve/CVE-2024-26717.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1209635
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1218321
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218643
* https://bugzilla.suse.com/show_bug.cgi?id=1218777
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220114
* https://bugzilla.suse.com/show_bug.cgi?id=1220176
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220337
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220365
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220775
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220797
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220887
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220937
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221045
* https://bugzilla.suse.com/show_bug.cgi?id=1221046
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221056
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221060
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221062
* https://bugzilla.suse.com/show_bug.cgi?id=1221066
* https://bugzilla.suse.com/show_bug.cgi?id=1221067
* https://bugzilla.suse.com/show_bug.cgi?id=1221068
* https://bugzilla.suse.com/show_bug.cgi?id=1221069
* https://bugzilla.suse.com/show_bug.cgi?id=1221070
* https://bugzilla.suse.com/show_bug.cgi?id=1221071
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221082
* https://bugzilla.suse.com/show_bug.cgi?id=1221090
* https://bugzilla.suse.com/show_bug.cgi?id=1221097
* https://bugzilla.suse.com/show_bug.cgi?id=1221156
* https://bugzilla.suse.com/show_bug.cgi?id=1221252
* https://bugzilla.suse.com/show_bug.cgi?id=1221273
* https://bugzilla.suse.com/show_bug.cgi?id=1221274
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221277
* https://bugzilla.suse.com/show_bug.cgi?id=1221291
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221298
* https://bugzilla.suse.com/show_bug.cgi?id=1221337
* https://bugzilla.suse.com/show_bug.cgi?id=1221338
* https://bugzilla.suse.com/show_bug.cgi?id=1221375
* https://bugzilla.suse.com/show_bug.cgi?id=1221379
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221613
* https://bugzilla.suse.com/show_bug.cgi?id=1221614
* https://bugzilla.suse.com/show_bug.cgi?id=1221616
* https://bugzilla.suse.com/show_bug.cgi?id=1221618
* https://bugzilla.suse.com/show_bug.cgi?id=1221631
* https://bugzilla.suse.com/show_bug.cgi?id=1221633
* https://bugzilla.suse.com/show_bug.cgi?id=1221713
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221814
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221951
* https://bugzilla.suse.com/show_bug.cgi?id=1222033
* https://bugzilla.suse.com/show_bug.cgi?id=1222056
* https://bugzilla.suse.com/show_bug.cgi?id=1222060
* https://bugzilla.suse.com/show_bug.cgi?id=1222070
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222274
* https://bugzilla.suse.com/show_bug.cgi?id=1222291
* https://bugzilla.suse.com/show_bug.cgi?id=1222300
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222317
* https://bugzilla.suse.com/show_bug.cgi?id=1222331
* https://bugzilla.suse.com/show_bug.cgi?id=1222355
* https://bugzilla.suse.com/show_bug.cgi?id=1222356
* https://bugzilla.suse.com/show_bug.cgi?id=1222360
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222373
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-7619
1
0
18 Apr '24
# Recommended update for samba
Announcement ID: SUSE-RU-2024:1333-1
Rating: moderate
References:
* bsc#1218431
* bsc#1219937
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for samba fixes the following issues:
* fd_handle_destructor() panics within an smbd_smb2_close() if vfs_stat_fsp()
fails in fd_close() (bsc#1219937).
* Remove -x from bash shebang update-apparmor-samba-profile; (bsc#1218431).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1333=1 SUSE-2024-1333=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1333=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1333=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-1333=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* samba-libs-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debugsource-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ldb-ldap-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* ctdb-pcp-pmda-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* ctdb-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* ctdb-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-tool-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ldb-ldap-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-test-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-test-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy-python3-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* ctdb-pcp-pmda-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-gpupdate-4.17.12+git.462.df636292e62-150500.3.23.7
* openSUSE Leap 15.5 (x86_64)
* samba-winbind-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-devel-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* openSUSE Leap 15.5 (noarch)
* samba-doc-4.17.12+git.462.df636292e62-150500.3.23.7
* openSUSE Leap 15.5 (aarch64 x86_64)
* samba-ceph-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ceph-4.17.12+git.462.df636292e62-150500.3.23.7
* openSUSE Leap 15.5 (aarch64_ilp32)
* samba-client-libs-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-devel-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-64bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-64bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* samba-client-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debugsource-4.17.12+git.462.df636292e62-150500.3.23.7
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* samba-libs-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debugsource-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ldb-ldap-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-tool-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ldb-ldap-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy-python3-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy0-python3-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* libsamba-policy-devel-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-gpupdate-4.17.12+git.462.df636292e62-150500.3.23.7
* Basesystem Module 15-SP5 (aarch64 x86_64)
* samba-ceph-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-ceph-4.17.12+git.462.df636292e62-150500.3.23.7
* Basesystem Module 15-SP5 (x86_64)
* samba-winbind-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-winbind-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-client-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-32bit-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-libs-32bit-4.17.12+git.462.df636292e62-150500.3.23.7
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* ctdb-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debuginfo-4.17.12+git.462.df636292e62-150500.3.23.7
* ctdb-4.17.12+git.462.df636292e62-150500.3.23.7
* samba-debugsource-4.17.12+git.462.df636292e62-150500.3.23.7
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218431
* https://bugzilla.suse.com/show_bug.cgi?id=1219937
1
0
17 Apr '24
# Recommended update for grub2
Announcement ID: SUSE-RU-2024:1331-1
Rating: moderate
References:
* bsc#1221866
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for grub2 fixes the following issues:
* Fix LPAR falls into grub shell after installation with lvm (bsc#1221866)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1331=1 SUSE-2024-1331=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1331=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1331=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1331=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* grub2-2.06-150500.29.25.12
* grub2-branding-upstream-2.06-150500.29.25.12
* grub2-debuginfo-2.06-150500.29.25.12
* openSUSE Leap 15.5 (aarch64 s390x x86_64 i586)
* grub2-debugsource-2.06-150500.29.25.12
* openSUSE Leap 15.5 (noarch)
* grub2-x86_64-xen-extras-2.06-150500.29.25.12
* grub2-powerpc-ieee1275-extras-2.06-150500.29.25.12
* grub2-x86_64-efi-debug-2.06-150500.29.25.12
* grub2-arm64-efi-extras-2.06-150500.29.25.12
* grub2-i386-efi-extras-2.06-150500.29.25.12
* grub2-s390x-emu-extras-2.06-150500.29.25.12
* grub2-i386-pc-2.06-150500.29.25.12
* grub2-i386-xen-extras-2.06-150500.29.25.12
* grub2-i386-pc-debug-2.06-150500.29.25.12
* grub2-i386-efi-debug-2.06-150500.29.25.12
* grub2-i386-pc-extras-2.06-150500.29.25.12
* grub2-i386-efi-2.06-150500.29.25.12
* grub2-snapper-plugin-2.06-150500.29.25.12
* grub2-x86_64-efi-2.06-150500.29.25.12
* grub2-i386-xen-2.06-150500.29.25.12
* grub2-arm64-efi-2.06-150500.29.25.12
* grub2-systemd-sleep-plugin-2.06-150500.29.25.12
* grub2-x86_64-efi-extras-2.06-150500.29.25.12
* grub2-x86_64-xen-2.06-150500.29.25.12
* grub2-arm64-efi-debug-2.06-150500.29.25.12
* grub2-powerpc-ieee1275-2.06-150500.29.25.12
* grub2-powerpc-ieee1275-debug-2.06-150500.29.25.12
* openSUSE Leap 15.5 (s390x)
* grub2-s390x-emu-debug-2.06-150500.29.25.12
* grub2-s390x-emu-2.06-150500.29.25.12
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* grub2-2.06-150500.29.25.12
* grub2-debugsource-2.06-150500.29.25.12
* grub2-debuginfo-2.06-150500.29.25.12
* SUSE Linux Enterprise Micro 5.5 (noarch)
* grub2-i386-pc-2.06-150500.29.25.12
* grub2-x86_64-efi-2.06-150500.29.25.12
* grub2-arm64-efi-2.06-150500.29.25.12
* grub2-snapper-plugin-2.06-150500.29.25.12
* grub2-x86_64-xen-2.06-150500.29.25.12
* SUSE Linux Enterprise Micro 5.5 (s390x)
* grub2-s390x-emu-2.06-150500.29.25.12
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* grub2-2.06-150500.29.25.12
* grub2-debuginfo-2.06-150500.29.25.12
* Basesystem Module 15-SP5 (noarch)
* grub2-i386-pc-2.06-150500.29.25.12
* grub2-powerpc-ieee1275-2.06-150500.29.25.12
* grub2-arm64-efi-2.06-150500.29.25.12
* grub2-snapper-plugin-2.06-150500.29.25.12
* grub2-x86_64-efi-2.06-150500.29.25.12
* grub2-systemd-sleep-plugin-2.06-150500.29.25.12
* Basesystem Module 15-SP5 (aarch64 s390x x86_64)
* grub2-debugsource-2.06-150500.29.25.12
* Basesystem Module 15-SP5 (s390x)
* grub2-s390x-emu-2.06-150500.29.25.12
* Server Applications Module 15-SP5 (noarch)
* grub2-x86_64-xen-2.06-150500.29.25.12
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221866
1
0
SUSE-RU-2024:1330-1: moderate: Recommended update for resource-agents
by OPENSUSE-UPDATES 17 Apr '24
by OPENSUSE-UPDATES 17 Apr '24
17 Apr '24
# Recommended update for resource-agents
Announcement ID: SUSE-RU-2024:1330-1
Rating: moderate
References:
* bsc#1220997
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for resource-agents fixes the following issue:
* resource-agents:azure-lb IPv6 support (bsc#1220997)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1330=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1330=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* ldirectord-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-debuginfo-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-debugsource-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-4.10.0+git40.0f4de473-150400.3.25.2
* openSUSE Leap 15.4 (noarch)
* monitoring-plugins-metadata-4.10.0+git40.0f4de473-150400.3.25.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ldirectord-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-debuginfo-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-debugsource-4.10.0+git40.0f4de473-150400.3.25.2
* resource-agents-4.10.0+git40.0f4de473-150400.3.25.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (noarch)
* monitoring-plugins-metadata-4.10.0+git40.0f4de473-150400.3.25.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220997
1
0
SUSE-RU-2024:1325-1: moderate: Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 17 Apr '24
by OPENSUSE-UPDATES 17 Apr '24
17 Apr '24
# Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed
Announcement ID: SUSE-RU-2024:1325-1
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:
Changes in nvidia-open-driver-G06-signed:
* Update to 550.67
Changes in kernel-firmware-nvidia-gspx-G06:
* update firmware to version 550.67
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1325=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1325=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1325=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1325=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1325=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1325=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1325=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1325=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1325=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1325=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1325=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1325=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1325=1
## Package List:
* openSUSE Leap 15.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* openSUSE Leap 15.4 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.67_k5.14.21_150400.14.75-150400.9.53.1
* nvidia-open-driver-G06-signed-azure-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-azure-550.67_k5.14.21_150400.14.75-150400.9.53.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150400.9.53.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150400.9.53.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150400.9.53.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150400.9.53.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Manager Proxy 4.3 (x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
* SUSE Manager Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150400.9.24.1
* SUSE Manager Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-default-devel-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150400.24.111-150400.9.53.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150400.24.111-150400.9.53.1
1
0
SUSE-RU-2024:1326-1: moderate: Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 17 Apr '24
by OPENSUSE-UPDATES 17 Apr '24
17 Apr '24
# Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed
Announcement ID: SUSE-RU-2024:1326-1
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that can now be installed.
## Description:
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:
Changes in nvidia-open-driver-G06-signed:
* Update to 550.67
Changes in kernel-firmware-nvidia-gspx-G06:
* update firmware to version 550.67
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1326=1 openSUSE-SLE-15.5-2024-1326=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1326=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1326=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1326=1
## Package List:
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150500.11.21.1
* openSUSE Leap 15.5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-550.67_k5.14.21_150500.33.37-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.67_k5.14.21_150500.33.37-150500.3.39.1
* nvidia-open-driver-G06-signed-azure-devel-550.67-150500.3.39.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-default-devel-550.67-150500.3.39.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150500.3.39.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150500.3.39.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150500.11.21.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150500.55.52-150500.3.39.1
* Basesystem Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.67-150500.11.21.1
* Basesystem Module 15-SP5 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-64kb-devel-550.67-150500.3.39.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.67_k5.14.21_150500.55.52-150500.3.39.1
* nvidia-open-driver-G06-signed-default-devel-550.67-150500.3.39.1
* nvidia-open-driver-G06-signed-debugsource-550.67-150500.3.39.1
* Public Cloud Module 15-SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-550.67_k5.14.21_150500.33.37-150500.3.39.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.67_k5.14.21_150500.33.37-150500.3.39.1
* nvidia-open-driver-G06-signed-azure-devel-550.67-150500.3.39.1
1
0
17 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1322-1
Rating: important
References:
* bsc#1194869
* bsc#1200465
* bsc#1205316
* bsc#1207948
* bsc#1209635
* bsc#1209657
* bsc#1212514
* bsc#1213456
* bsc#1214852
* bsc#1215221
* bsc#1215322
* bsc#1217339
* bsc#1217959
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1218321
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1218643
* bsc#1218777
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1219834
* bsc#1220114
* bsc#1220176
* bsc#1220237
* bsc#1220251
* bsc#1220320
* bsc#1220325
* bsc#1220328
* bsc#1220337
* bsc#1220340
* bsc#1220365
* bsc#1220366
* bsc#1220398
* bsc#1220411
* bsc#1220413
* bsc#1220433
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220469
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220492
* bsc#1220703
* bsc#1220735
* bsc#1220736
* bsc#1220775
* bsc#1220790
* bsc#1220797
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220845
* bsc#1220848
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220883
* bsc#1220885
* bsc#1220887
* bsc#1220898
* bsc#1220917
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220930
* bsc#1220931
* bsc#1220932
* bsc#1220933
* bsc#1220937
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221044
* bsc#1221045
* bsc#1221046
* bsc#1221048
* bsc#1221055
* bsc#1221056
* bsc#1221058
* bsc#1221060
* bsc#1221061
* bsc#1221062
* bsc#1221066
* bsc#1221067
* bsc#1221068
* bsc#1221069
* bsc#1221070
* bsc#1221071
* bsc#1221077
* bsc#1221082
* bsc#1221090
* bsc#1221097
* bsc#1221156
* bsc#1221252
* bsc#1221273
* bsc#1221274
* bsc#1221276
* bsc#1221277
* bsc#1221291
* bsc#1221293
* bsc#1221298
* bsc#1221337
* bsc#1221338
* bsc#1221375
* bsc#1221379
* bsc#1221551
* bsc#1221553
* bsc#1221613
* bsc#1221614
* bsc#1221616
* bsc#1221618
* bsc#1221631
* bsc#1221633
* bsc#1221713
* bsc#1221725
* bsc#1221777
* bsc#1221814
* bsc#1221816
* bsc#1221830
* bsc#1221951
* bsc#1222033
* bsc#1222056
* bsc#1222060
* bsc#1222070
* bsc#1222073
* bsc#1222117
* bsc#1222274
* bsc#1222291
* bsc#1222300
* bsc#1222304
* bsc#1222317
* bsc#1222331
* bsc#1222355
* bsc#1222356
* bsc#1222360
* bsc#1222366
* bsc#1222373
* bsc#1222619
* jsc#PED-5759
* jsc#PED-7167
* jsc#PED-7618
* jsc#PED-7619
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46934
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47083
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-4744
* CVE-2022-48626
* CVE-2022-48627
* CVE-2022-48628
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-0160
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-4881
* CVE-2023-52447
* CVE-2023-52450
* CVE-2023-52453
* CVE-2023-52454
* CVE-2023-52462
* CVE-2023-52463
* CVE-2023-52467
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52476
* CVE-2023-52477
* CVE-2023-52481
* CVE-2023-52482
* CVE-2023-52484
* CVE-2023-52486
* CVE-2023-52492
* CVE-2023-52493
* CVE-2023-52494
* CVE-2023-52497
* CVE-2023-52500
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52518
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52530
* CVE-2023-52531
* CVE-2023-52532
* CVE-2023-52559
* CVE-2023-52563
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52587
* CVE-2023-52591
* CVE-2023-52594
* CVE-2023-52595
* CVE-2023-52597
* CVE-2023-52598
* CVE-2023-52599
* CVE-2023-52600
* CVE-2023-52601
* CVE-2023-52602
* CVE-2023-52603
* CVE-2023-52604
* CVE-2023-52605
* CVE-2023-52606
* CVE-2023-52607
* CVE-2023-52608
* CVE-2023-52612
* CVE-2023-52615
* CVE-2023-52617
* CVE-2023-52619
* CVE-2023-52621
* CVE-2023-52623
* CVE-2023-52628
* CVE-2023-52632
* CVE-2023-52637
* CVE-2023-52639
* CVE-2023-6270
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-25739
* CVE-2024-25742
* CVE-2024-26599
* CVE-2024-26600
* CVE-2024-26602
* CVE-2024-26607
* CVE-2024-26612
* CVE-2024-26614
* CVE-2024-26620
* CVE-2024-26627
* CVE-2024-26629
* CVE-2024-26642
* CVE-2024-26645
* CVE-2024-26646
* CVE-2024-26651
* CVE-2024-26654
* CVE-2024-26659
* CVE-2024-26664
* CVE-2024-26667
* CVE-2024-26670
* CVE-2024-26695
* CVE-2024-26717
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46934 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48628 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52462 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52467 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-52484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52494 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26599 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26629 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26646 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5
An update that solves 149 vulnerabilities, contains four features and has 29
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46934: Fixed a bug by validating user data in compat ioctl
(bsc#1220469).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek:
(bsc#1220917).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2022-4744: Fixed double-free that could lead to DoS or privilege
escalation in TUN/TAP device driver functionality (bsc#1209635).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer
(bsc#1220845).
* CVE-2022-48628: Fixed possible lock in ceph (bsc#1220848).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52462: Fixed check for attempt to corrupt spilled pointer
(bsc#1220325).
* CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
* CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register
(bsc#1220433).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520
(bsc#1220887).
* CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors
(bsc#1220735).
* CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).
* CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
* CVE-2023-52494: Fixed missing alignment check for event ring read pointer in
bus/mhi/host (bsc#1221273).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).
* CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend
(bsc#1220933).
* CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson
(bsc#1220937).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).
* CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).
* CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs
(bsc#1221062).
* CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
* CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs
(bsc#1221068).
* CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs
(bsc#1221070).
* CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot()
(bsc#1221066).
* CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree()
(bsc#1221067).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib
(bsc#1221069).
* CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi
(bsc#1221375).
* CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
(bsc#1221616).
* CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
* CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove
(bsc#1221613).
* CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
number in pstore/ram (bsc#1221618).
* CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
* CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd
(bsc#1222274).
* CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939
(bsc#1222291).
* CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed
(bsc#1222300).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate()
(bsc#1220365).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
* CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences
(bsc#1221291).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap
(bsc#1221298).
* CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
* CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in
nfsd (bsc#1221379).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26645: Fixed missing visibility when inserting an element into
tracing_map (bsc#1222056).
* CVE-2024-26646: Fixed potential memory corruption when resuming from suspend
or hibernation in thermal/intel/hfi (bsc#1222070).
* CVE-2024-26651: Fixed possible oops via malicious devices in sr9800
(bsc#1221337).
* CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
* CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
events in xhci (bsc#1222317).
* CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in
hwmon coretemp (bsc#1222355).
* CVE-2024-26667: Fixed null pointer reference in
dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
* CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in
kernel arm64 (bsc#1222356).
* CVE-2024-26695: Fixed null pointer dereference in
__sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
* CVE-2024-26717: Fixed null pointer dereference on failed power up in HID
i2c-hid-of (bsc#1222360).
The following non-security bugs were fixed:
* acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-
fixes).
* acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-
fixes).
* acpi: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-
fixes).
* acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* acpi: scan: Fix device check notification handling (git-fixes).
* acpica: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
* alsa: aoa: avoid false-positive format truncation warning (git-fixes).
* alsa: aw2: avoid casting function pointers (git-fixes).
* alsa: ctxfi: avoid casting function pointers (git-fixes).
* alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-
fixes).
* alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-
fixes).
* alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897
platform (git-fixes).
* alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
* alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
* alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
* alsa: seq: fix function cast warnings (git-fixes).
* alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* alsa: usb-audio: Stop parsing channels bits when all channels are found
(git-fixes).
* arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-
fixes)
* arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
* arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
* arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
* arm64: mm: fix VA-range sanity check (git-fixes)
* arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
* asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
(stable-fixes).
* asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
* asoc: amd: acp: fix for acp_init function error handling (git-fixes).
* asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
* asoc: meson: Use dev_err_probe() helper (stable-fixes).
* asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
* asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
* asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
* asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
* asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
* asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* asoc: rt5682-sdw: fix locking sequence (git-fixes).
* asoc: rt711-sdca: fix locking sequence (git-fixes).
* asoc: rt711-sdw: fix locking sequence (git-fixes).
* asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-
fixes).
* asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
* asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-
fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* backlight: da9052: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-
fixes).
* backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
* backlight: lm3639: Fully initialize backlight_properties during probe (git-
fixes).
* backlight: lp8788: Fully initialize backlight_properties during probe (git-
fixes).
* blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
* bluetooth: Remove HCI_POWER_OFF_TIMEOUT (git-fixes).
* bluetooth: Remove superfluous call to hci_conn_check_pending() (git-fixes).
* bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
* bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
* bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-
fixes).
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
* can: softing: remove redundant NULL check (git-fixes).
* clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-
fixes).
* comedi: comedi_test: Prevent timers rescheduling during deletion (git-
fixes).
* coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
* coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
* coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus
(bsc#1220775)
* cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf()
(git-fixes).
* cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value
(git-fixes).
* crypto: arm/sha - fix function cast warnings (git-fixes).
* crypto: qat - avoid division by zero (git-fixes).
* crypto: qat - fix deadlock in backlog processing (git-fixes).
* crypto: qat - fix double free during reset (git-fixes).
* crypto: qat - fix state machines cleanup paths (bsc#1218321).
* crypto: qat - fix unregistration of compression algorithms (git-fixes).
* crypto: qat - fix unregistration of crypto algorithms (git-fixes).
* crypto: qat - ignore subsequent state up commands (git-fixes).
* crypto: qat - increase size of buffers (git-fixes).
* crypto: qat - resolve race condition during AER recovery (git-fixes).
* crypto: xilinx - call finalize with bh disabled (git-fixes).
* doc-guide: kernel-doc: tell about object-like macros (git-fixes).
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* drivers: hv: vmbus: Calculate ring buffer size for more efficient use of
memory (git-fixes).
* drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
* drm/amd/display: Add function for validate and update new stream (git-
fixes).
* drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
* drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-
fixes).
* drm/amd/display: Check if link state is valid (git-fixes).
* drm/amd/display: Copy DC context in the commit streams (git-fixes).
* drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
* drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
* drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
* drm/amd/display: Exit idle optimizations before attempt to access PHY (git-
fixes).
* drm/amd/display: Expand kernel doc for DC (git-fixes).
* drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
* drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
(git-fixes).
* drm/amd/display: Fix possible underflow for displays with large vblank (git-
fixes).
* drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
* drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
* drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-
fixes).
* drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-
fixes).
* drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
* drm/amd/display: Handle seamless boot stream (git-fixes).
* drm/amd/display: Handle virtual hardware detect (git-fixes).
* drm/amd/display: Include surface of unaffected streams (git-fixes).
* drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
* drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml
(git-fixes).
* drm/amd/display: Keep PHY active for dp config (git-fixes).
* drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
* drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
* drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Revert vblank change that causes null pointer crash (git-
fixes).
* drm/amd/display: Rework comments on dc file (git-fixes).
* drm/amd/display: Rework context change check (git-fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-
fixes).
* drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-
fixes).
* drm/amd/display: Update OTG instance in the commit stream (git-fixes).
* drm/amd/display: Update correct DCN314 register header (git-fixes).
* drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-
fixes).
* drm/amd/display: Use DRAM speed from validation for dummy p-state (git-
fixes).
* drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
* drm/amd/display: Use min transition for all SubVP plane add/remove (git-
fixes).
* drm/amd/display: Write to correct dirty_rect (git-fixes).
* drm/amd/display: Wrong colorimetry workaround (git-fixes).
* drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
* drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
* drm/amd/display: always switch off ODM before committing more streams (git-
fixes).
* drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-
fixes).
* drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
* drm/amd/display: ensure async flips are only accepted for fast updates (git-
fixes).
* drm/amd/display: fix ABM disablement (git-fixes).
* drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()
(git-fixes).
* drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
* drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
* drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
* drm/amd/display: fix unbounded requesting for high pixel rate modes on
dcn315 (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: perform a bounds check before filling dirty rectangles
(git-fixes).
* drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
* drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
* drm/amd/display: use low clocks for no plane configs (git-fixes).
* drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
* drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
* drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock
(git-fixes).
* drm/amd: Enable PCIe PME from D3 (git-fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
* drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
* drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int()
(git-fixes).
* drm/amdgpu: Force order between a read and write to the same address (git-
fixes).
* drm/amdgpu: Match against exact bootloader status (git-fixes).
* drm/amdgpu: Unset context priority is now invalid (git-fixes).
* drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: lower CS errors to debug severity (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
* drm/display: fix typo (git-fixes).
* drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
* drm/etnaviv: Restore some id values (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/exynos: fix a possible null-pointer dereference due to data race in
exynos_drm_crtc_atomic_disable() (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
* drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
* drm/i915: Add missing CCS documentation (git-fixes).
* drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled
(git-fixes).
* drm/i915: Check before removing mm notifier (git-fixes).
* drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
* drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
(git-fixes).
* drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
* drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-
fixes).
* drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
* drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
* drm/msm/dpu: improve DSC allocation (git-fixes).
* drm/panel-edp: use put_sync in unprepare (git-fixes).
* drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-
fixes).
* drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
* drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-
fixes).
* drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
* drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
* drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
* drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
* drm/rockchip: lvds: do not overwrite error code (git-fixes).
* drm/rockchip: lvds: do not print scary message when probing defer (git-
fixes).
* drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-
fixes).
* drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
* drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path
of tegra_dsi_probe() (git-fixes).
* drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-
fixes).
* drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-
fixes).
* drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
* drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-
fixes).
* drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths
of tegra_output_probe() (git-fixes).
* drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
* drm/tegra: rgb: Fix missing clk_put() in the error handling paths of
tegra_dc_rgb_probe() (git-fixes).
* drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-
fixes).
* drm/tidss: Fix initial plane zpos values (git-fixes).
* drm/tidss: Fix sync-lost issue with two displays (git-fixes).
* drm/ttm: Do not leak a resource on eviction error (git-fixes).
* drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
* drm/vc4: Add module dependency on hdmi-codec (git-fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-
fixes).
* drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
* drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017)
(git-fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* fix "coresight: etm4x: Change etm4_platform_driver driver for MMIO devices"
(bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to
another function.
* hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
* hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
* hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-
fixes).
* hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-
fixes).
* hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-
fixes).
* i2c: aspeed: Fix the dummy irq expected print (git-fixes).
* i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-
fixes).
* i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
* ib/ipoib: Fix mcast list locking (git-fixes)
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
* input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).
* input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).
* input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).
* input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).
* input: pm8941-pwrkey - add software key press debouncing support (git-
fixes).
* input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).
* input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
* input: xpad - add Lenovo Legion Go controllers (git-fixes).
* iommu/amd: Mark interrupt as managed (git-fixes).
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-
fixes).
* iommu/mediatek: Fix forever loop in error handling (git-fixes).
* iommu/vt-d: Allow to use flush-queue when first level is default (git-
fixes).
* iommu/vt-d: Do not issue ATS Invalidation request when device is
disconnected (git-fixes).
* iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
* iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
* kabi: PCI: Add locking to RMW PCI Express Capability Register accessors
(kabi).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
* lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is
detected (git-commit).
* leds: aw2013: Unlock mutex before destroying it (git-fixes).
* lib/cmdline: Fix an invalid format specifier in an assertion msg (git-
fixes).
* make NVIDIA Grace-Hopper TPM related drivers build-ins (bsc#1221156)
* md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
* md/raid5: release batch_last before waiting for another stripe_head (git-
fixes).
* md/raid6: use valid sector values to determine if an I/O should wait on the
reshape (git-fixes).
* md: Do not ignore suspended array in md_check_recovery() (git-fixes).
* md: Make sure md_do_sync() will set MD_RECOVERY_DONE (git-fixes).
* md: Whenassemble the array, consult the superblock of the freshest device
(git-fixes).
* md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly()
(git-fixes).
* md: fix data corruption for raid456 when reshape restart while grow up (git-
fixes).
* md: introduce md_ro_state (git-fixes).
* media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
* media: edia: dvbdev: fix a use-after-free (git-fixes).
* media: em28xx: annotate unchecked call to media_device_register() (git-
fixes).
* media: go7007: add check of return value of go7007_read_addr() (git-fixes).
* media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
* media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
* media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
* media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
* media: pvrusb2: remove redundant NULL check (git-fixes).
* media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-
fixes).
* media: sun8i-di: Fix chroma difference threshold (git-fixes).
* media: sun8i-di: Fix coefficient writes (git-fixes).
* media: sun8i-di: Fix power on/off sequences (git-fixes).
* media: tc358743: register v4l2 async device only after successful setup
(git-fixes).
* media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
* media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
* media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
* media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
* media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
* mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a
ref (git-fixes).
* mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref
(git-fixes).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Fix switch on gp3 partition (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
* mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
* mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
* mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove
function (git-fixes).
* mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
* mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
* mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
* net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* net: Fix features skip in for_each_netdev_feature() (git-fixes).
* net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfs: fix an off by one in root_nfs_cat() (git-fixes).
* nfs: rename nfs_client_kset to nfs_kset (git-fixes).
* nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* nfsd: convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
* nfsd: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
* nfsd: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
* nfsd: fix file memleak on client_opens_release (git-fixes).
* nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
* nfsd: lock_rename() needs both directories to live on the same fs (git-
fixes).
* nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* nfsd: retransmit callbacks after client reconnects (git-fixes).
* nfsd: use vfs setgid helper (git-fixes).
* nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
* nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
* nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nfsv4.2: fix wrong shrinker_id (git-fixes).
* nfsv4: fix a nfs4_state_manager() race (git-fixes).
* nfsv4: fix a state manager thread deadlock regression (git-fixes).
* nilfs2: fix failure to detect DAT corruption in btree and direct mappings
(git-fixes).
* nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
* pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
* pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
* pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
* pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
* pci: add locking to RMW PCI Express Capability Register accessors (git-
fixes).
* pci: dwc: Fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
* pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
* pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-
fixes).
* pci: fu740: Set the number of MSI vectors (git-fixes).
* pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-
fixes).
* pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
* pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
* pci: mediatek: Clear interrupt status before dispatching handler (git-
fixes).
* pci: qcom: Enable BDF to SID translation properly (git-fixes).
* pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-
fixes).
* pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
* pci: rockchip: Fix window mapping and address translation for endpoint (git-
fixes).
* pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
* pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-
fixes).
* pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-
fixes).
* platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
* pm: suspend: Set mem_sleep_current during kernel command line setup (git-
fixes).
* pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats
(git-fixes).
* pnfs: Fix a hang in nfs4_evict_inode() (git-fixes).
* pnfs: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
* powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
* powerpc/boot: Disable power10 features after BOOTAFLAGS assignment
(bsc#1194869).
* powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU
(bsc#1194869).
* powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses
(bsc#1194869).
* powerpc/lib/sstep: Remove unneeded #ifdef **powerpc64** (bsc#1194869).
* powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding
(bsc#1194869).
* powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465
ltc#197256 jsc#SLE-18130 git-fixes).
* powerpc/sstep: Use bitwise instead of arithmetic operator for flags
(bsc#1194869).
* powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
* pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-
fixes).
* qedf: Do not process stag work during unload (bsc#1214852).
* qedf: Wait for stag work during unload (bsc#1214852).
* raid1: fix use-after-free for original bio in raid1_write_request()
(bsc#1221097).
* ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
* ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
* ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
* ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
* ras/amd/fmpm: Save SPA values (jsc#PED-7619).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
* ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
* rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
* rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
* rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
* rdma/irdma: Remove duplicate assignment (git-fixes)
* rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
* rdma/mlx5: fix fortify source warning while accessing Eth segment (git-
fixes)
* rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
* rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-
fixes)
* rdma/srpt: do not register event handler until srpt device is fully setup
(git-fixes)
* revert "PCI: tegra194: Enable support for 256 Byte payload" (git-fixes).
* revert "Revert "drm/amdgpu/display: change pipe policy for DCN 2.0"" (git-
fixes).
* revert "SUNRPC dont update timeout value on connection reset" (git-fixes).
* revert "drm/amd: Disable PSR-SU on Parade 0803 TCON" (git-fixes).
* revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" (git-
fixes).
* revert "drm/amdgpu/display: change pipe policy for DCN 2.0" (git-fixes).
* revert "drm/amdgpu/display: change pipe policy for DCN 2.1" (git-fixes).
* revert "drm/vc4: hdmi: Enforce the minimum rate at runtime_resume" (git-
fixes).
* revert "fbdev: flush deferred IO before closing (git-fixes)." (bsc#1221814)
* ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes
bsc#1221633).
* s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
* s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
* s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
* sched/rt: Disallow writing invalid values to sched_rt_period_us
(bsc#1220176).
* sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
(bsc#1220176).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
* scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
* scsi: qedf: Remove unused declaration (bsc#1214852).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: storvsc: Fix ring buffer size calculation (git-fixes).
* scsi: target: core: Silence the message about unknown VPD pages
(bsc#1221252).
* selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* sr9800: Add check for usbnet_get_endpoints (git-fixes).
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
* sunrpc: ECONNRESET might require a rebind (git-fixes).
* sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
* sunrpc: Fix a suspicious RCU usage warning (git-fixes).
* sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
* sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
* svcrdma: Drop connection after an RDMA Read error (git-fixes).
* topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).
* topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).
* tracing/probes: Fix to show a parse error for bad type for $comm (git-
fixes).
* tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).
* tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
* tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-
fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
* usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
* usb: port: Do not try to peer unused USB ports based on location (git-
fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-
fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vt: fix unicode buffer corruption when deleting characters (git-fixes).
* watchdog: stm32_iwdg: initialize default timeout (git-fixes).
* wifi: ath10k: fix NULL pointer dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
* wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete
(git-fixes).
* wifi: b43: Disable QoS for bcm4331 (git-fixes).
* wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-
fixes).
* wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-
fixes).
* wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-
fixes).
* wifi: brcmsmac: avoid function pointer casts (git-fixes).
* wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
* wifi: iwlwifi: fix EWRD table validity check (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
* wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-
fixes).
* wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
* wifi: mwifiex: debugfs: Drop unnecessary error check for
debugfs_create_dir() (git-fixes).
* wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
* wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
* wifi: wilc1000: fix RCU usage in connect path (git-fixes).
* wifi: wilc1000: fix declarations ordering (stable-fixes).
* wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
* wifi: wilc1000: prevent use-after-free on vif when cleaning up all
interfaces (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
* xhci: process isoc TD properly when there was a transaction error mid TD
(git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1322=1 openSUSE-SLE-15.5-2024-1322=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1322=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1322=1
* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-1322=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.43.1
* kernel-source-rt-5.14.21-150500.13.43.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-vdso-5.14.21-150500.13.43.1
* gfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-5.14.21-150500.13.43.1
* kernel-livepatch-5_14_21-150500_13_43-rt-1-150500.11.5.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* kselftests-kmp-rt-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-livepatch-5.14.21-150500.13.43.1
* kernel-livepatch-5_14_21-150500_13_43-rt-debuginfo-1-150500.11.5.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-extra-5.14.21-150500.13.43.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.43.1
* kernel-syms-rt-5.14.21-150500.13.43.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.43.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-optional-5.14.21-150500.13.43.1
* kernel-rt-devel-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-5.14.21-150500.13.43.1
* kernel-livepatch-SLE15-SP5-RT_Update_12-debugsource-1-150500.11.5.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.43.1
* reiserfs-kmp-rt-5.14.21-150500.13.43.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.43.1
* kernel-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.43.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_12-debugsource-1-150500.11.5.1
* kernel-livepatch-5_14_21-150500_13_43-rt-debuginfo-1-150500.11.5.1
* kernel-livepatch-5_14_21-150500_13_43-rt-1-150500.11.5.1
* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt-vdso-5.14.21-150500.13.43.1
* gfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-5.14.21-150500.13.43.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-syms-rt-5.14.21-150500.13.43.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.43.1
* kernel-rt-debugsource-5.14.21-150500.13.43.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.43.1
* dlm-kmp-rt-5.14.21-150500.13.43.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.43.1
* kernel-rt-devel-5.14.21-150500.13.43.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.43.1
* kernel-rt_debug-vdso-5.14.21-150500.13.43.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.43.1
* kernel-source-rt-5.14.21-150500.13.43.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.43.1
* kernel-rt-5.14.21-150500.13.43.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46934.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47083.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-4744.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48627.html
* https://www.suse.com/security/cve/CVE-2022-48628.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52453.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52462.html
* https://www.suse.com/security/cve/CVE-2023-52463.html
* https://www.suse.com/security/cve/CVE-2023-52467.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52481.html
* https://www.suse.com/security/cve/CVE-2023-52482.html
* https://www.suse.com/security/cve/CVE-2023-52484.html
* https://www.suse.com/security/cve/CVE-2023-52486.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52493.html
* https://www.suse.com/security/cve/CVE-2023-52494.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52518.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52530.html
* https://www.suse.com/security/cve/CVE-2023-52531.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52559.html
* https://www.suse.com/security/cve/CVE-2023-52563.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52587.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52594.html
* https://www.suse.com/security/cve/CVE-2023-52595.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52598.html
* https://www.suse.com/security/cve/CVE-2023-52599.html
* https://www.suse.com/security/cve/CVE-2023-52600.html
* https://www.suse.com/security/cve/CVE-2023-52601.html
* https://www.suse.com/security/cve/CVE-2023-52602.html
* https://www.suse.com/security/cve/CVE-2023-52603.html
* https://www.suse.com/security/cve/CVE-2023-52604.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52606.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52608.html
* https://www.suse.com/security/cve/CVE-2023-52612.html
* https://www.suse.com/security/cve/CVE-2023-52615.html
* https://www.suse.com/security/cve/CVE-2023-52617.html
* https://www.suse.com/security/cve/CVE-2023-52619.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2023-52623.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-52632.html
* https://www.suse.com/security/cve/CVE-2023-52637.html
* https://www.suse.com/security/cve/CVE-2023-52639.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26599.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26607.html
* https://www.suse.com/security/cve/CVE-2024-26612.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26620.html
* https://www.suse.com/security/cve/CVE-2024-26627.html
* https://www.suse.com/security/cve/CVE-2024-26629.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26645.html
* https://www.suse.com/security/cve/CVE-2024-26646.html
* https://www.suse.com/security/cve/CVE-2024-26651.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26659.html
* https://www.suse.com/security/cve/CVE-2024-26664.html
* https://www.suse.com/security/cve/CVE-2024-26667.html
* https://www.suse.com/security/cve/CVE-2024-26670.html
* https://www.suse.com/security/cve/CVE-2024-26695.html
* https://www.suse.com/security/cve/CVE-2024-26717.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1209635
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1218321
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218643
* https://bugzilla.suse.com/show_bug.cgi?id=1218777
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220114
* https://bugzilla.suse.com/show_bug.cgi?id=1220176
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220325
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220337
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220365
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220433
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220469
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220735
* https://bugzilla.suse.com/show_bug.cgi?id=1220736
* https://bugzilla.suse.com/show_bug.cgi?id=1220775
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220797
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220845
* https://bugzilla.suse.com/show_bug.cgi?id=1220848
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220887
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220917
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220930
* https://bugzilla.suse.com/show_bug.cgi?id=1220931
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220933
* https://bugzilla.suse.com/show_bug.cgi?id=1220937
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221045
* https://bugzilla.suse.com/show_bug.cgi?id=1221046
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221056
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221060
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221062
* https://bugzilla.suse.com/show_bug.cgi?id=1221066
* https://bugzilla.suse.com/show_bug.cgi?id=1221067
* https://bugzilla.suse.com/show_bug.cgi?id=1221068
* https://bugzilla.suse.com/show_bug.cgi?id=1221069
* https://bugzilla.suse.com/show_bug.cgi?id=1221070
* https://bugzilla.suse.com/show_bug.cgi?id=1221071
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221082
* https://bugzilla.suse.com/show_bug.cgi?id=1221090
* https://bugzilla.suse.com/show_bug.cgi?id=1221097
* https://bugzilla.suse.com/show_bug.cgi?id=1221156
* https://bugzilla.suse.com/show_bug.cgi?id=1221252
* https://bugzilla.suse.com/show_bug.cgi?id=1221273
* https://bugzilla.suse.com/show_bug.cgi?id=1221274
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221277
* https://bugzilla.suse.com/show_bug.cgi?id=1221291
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221298
* https://bugzilla.suse.com/show_bug.cgi?id=1221337
* https://bugzilla.suse.com/show_bug.cgi?id=1221338
* https://bugzilla.suse.com/show_bug.cgi?id=1221375
* https://bugzilla.suse.com/show_bug.cgi?id=1221379
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221613
* https://bugzilla.suse.com/show_bug.cgi?id=1221614
* https://bugzilla.suse.com/show_bug.cgi?id=1221616
* https://bugzilla.suse.com/show_bug.cgi?id=1221618
* https://bugzilla.suse.com/show_bug.cgi?id=1221631
* https://bugzilla.suse.com/show_bug.cgi?id=1221633
* https://bugzilla.suse.com/show_bug.cgi?id=1221713
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221814
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221951
* https://bugzilla.suse.com/show_bug.cgi?id=1222033
* https://bugzilla.suse.com/show_bug.cgi?id=1222056
* https://bugzilla.suse.com/show_bug.cgi?id=1222060
* https://bugzilla.suse.com/show_bug.cgi?id=1222070
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222274
* https://bugzilla.suse.com/show_bug.cgi?id=1222291
* https://bugzilla.suse.com/show_bug.cgi?id=1222300
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222317
* https://bugzilla.suse.com/show_bug.cgi?id=1222331
* https://bugzilla.suse.com/show_bug.cgi?id=1222355
* https://bugzilla.suse.com/show_bug.cgi?id=1222356
* https://bugzilla.suse.com/show_bug.cgi?id=1222360
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222373
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-7618
* https://jira.suse.com/browse/PED-7619
1
0
17 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1321-1
Rating: important
References:
* bsc#1200599
* bsc#1209635
* bsc#1212514
* bsc#1213456
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1220237
* bsc#1220251
* bsc#1220320
* bsc#1220340
* bsc#1220366
* bsc#1220411
* bsc#1220413
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220790
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220885
* bsc#1220898
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220932
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221048
* bsc#1221055
* bsc#1221058
* bsc#1221077
* bsc#1221276
* bsc#1221551
* bsc#1221553
* bsc#1221725
* bsc#1222073
* bsc#1222619
* jsc#PED-5759
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-20154
* CVE-2022-4744
* CVE-2022-48626
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-52447
* CVE-2023-52450
* CVE-2023-52454
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52477
* CVE-2023-52492
* CVE-2023-52497
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52532
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52597
* CVE-2023-52605
* CVE-2023-52621
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2024-25742
* CVE-2024-26600
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-20154 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 77 vulnerabilities, contains one feature and has two
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2022-20154: Fixed a use after free due to a race condition in
lock_sock_nested of sock.c. This could lead to local escalation of privilege
with System execution privileges needed (bsc#1200599).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2022-4744: Fixed double-free that could lead to DoS or privilege
escalation in TUN/TAP device driver functionality (bsc#1209635).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
The following non-security bugs were fixed:
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1321=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1321=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1321=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1321=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1321=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1321=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1321=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1321=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1321=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1321=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1321=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1321=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1321=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1321=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1321=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1321=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1321=1
## Package List:
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.116.1
* kernel-source-vanilla-5.14.21-150400.24.116.1
* kernel-source-5.14.21-150400.24.116.1
* kernel-docs-html-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debuginfo-5.14.21-150400.24.116.1
* kernel-debug-devel-5.14.21-150400.24.116.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-debug-debugsource-5.14.21-150400.24.116.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.116.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.116.1
* kernel-kvmsmall-devel-5.14.21-150400.24.116.1
* kernel-default-base-rebuild-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* gfs2-kmp-default-5.14.21-150400.24.116.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-livepatch-devel-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-obs-qa-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.116.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-default-livepatch-5.14.21-150400.24.116.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.116.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-optional-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* kernel-default-extra-5.14.21-150400.24.116.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* reiserfs-kmp-default-5.14.21-150400.24.116.1
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* ocfs2-kmp-default-5.14.21-150400.24.116.1
* dlm-kmp-default-5.14.21-150400.24.116.1
* cluster-md-kmp-default-5.14.21-150400.24.116.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kselftests-kmp-default-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-1-150400.9.5.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-1-150400.9.5.1
* kernel-livepatch-5_14_21-150400_24_116-default-1-150400.9.5.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.116.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (aarch64)
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* dtb-broadcom-5.14.21-150400.24.116.1
* dlm-kmp-64kb-5.14.21-150400.24.116.1
* dtb-exynos-5.14.21-150400.24.116.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* reiserfs-kmp-64kb-5.14.21-150400.24.116.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* dtb-amd-5.14.21-150400.24.116.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.116.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.116.1
* dtb-marvell-5.14.21-150400.24.116.1
* dtb-nvidia-5.14.21-150400.24.116.1
* dtb-xilinx-5.14.21-150400.24.116.1
* cluster-md-kmp-64kb-5.14.21-150400.24.116.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.116.1
* dtb-renesas-5.14.21-150400.24.116.1
* dtb-apm-5.14.21-150400.24.116.1
* dtb-hisilicon-5.14.21-150400.24.116.1
* kernel-64kb-devel-5.14.21-150400.24.116.1
* dtb-altera-5.14.21-150400.24.116.1
* kernel-64kb-debugsource-5.14.21-150400.24.116.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* dtb-cavium-5.14.21-150400.24.116.1
* dtb-socionext-5.14.21-150400.24.116.1
* dtb-freescale-5.14.21-150400.24.116.1
* dtb-apple-5.14.21-150400.24.116.1
* dtb-rockchip-5.14.21-150400.24.116.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* kselftests-kmp-64kb-5.14.21-150400.24.116.1
* gfs2-kmp-64kb-5.14.21-150400.24.116.1
* ocfs2-kmp-64kb-5.14.21-150400.24.116.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.116.1
* dtb-amlogic-5.14.21-150400.24.116.1
* dtb-sprd-5.14.21-150400.24.116.1
* dtb-amazon-5.14.21-150400.24.116.1
* kernel-64kb-extra-5.14.21-150400.24.116.1
* dtb-mediatek-5.14.21-150400.24.116.1
* kernel-64kb-optional-5.14.21-150400.24.116.1
* dtb-arm-5.14.21-150400.24.116.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.116.1
* kernel-64kb-debuginfo-5.14.21-150400.24.116.1
* dtb-allwinner-5.14.21-150400.24.116.1
* dtb-lg-5.14.21-150400.24.116.1
* dtb-qcom-5.14.21-150400.24.116.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.116.1
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.116.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-1-150400.9.5.1
* kernel-default-livepatch-5.14.21-150400.24.116.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-1-150400.9.5.1
* kernel-livepatch-5_14_21-150400_24_116-default-1-150400.9.5.1
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.14.21-150400.24.116.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debugsource-5.14.21-150400.24.116.1
* dlm-kmp-default-5.14.21-150400.24.116.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.116.1
* cluster-md-kmp-default-5.14.21-150400.24.116.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.116.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* ocfs2-kmp-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.116.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-64kb-debugsource-5.14.21-150400.24.116.1
* kernel-64kb-debuginfo-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* reiserfs-kmp-default-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.116.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-64kb-debugsource-5.14.21-150400.24.116.1
* kernel-64kb-debuginfo-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* reiserfs-kmp-default-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* kernel-default-extra-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.116.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-64kb-debugsource-5.14.21-150400.24.116.1
* kernel-64kb-debuginfo-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* reiserfs-kmp-default-5.14.21-150400.24.116.1
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.116.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-obs-build-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* reiserfs-kmp-default-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* kernel-obs-build-debugsource-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.116.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.116.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.116.1
* kernel-default-devel-5.14.21-150400.24.116.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.116.1
* kernel-syms-5.14.21-150400.24.116.1
* kernel-default-debuginfo-5.14.21-150400.24.116.1
* SUSE Manager Server 4.3 (noarch)
* kernel-source-5.14.21-150400.24.116.1
* kernel-devel-5.14.21-150400.24.116.1
* kernel-macros-5.14.21-150400.24.116.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.116.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.116.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.116.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-20154.html
* https://www.suse.com/security/cve/CVE-2022-4744.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://bugzilla.suse.com/show_bug.cgi?id=1200599
* https://bugzilla.suse.com/show_bug.cgi?id=1209635
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
1
0
17 Apr '24
# Recommended update for yast2-sap-ha
Announcement ID: SUSE-RU-2024:1323-1
Rating: moderate
References:
* bsc#1214603
* bsc#1216651
* bsc#1217596
* bsc#1221049
Affected Products:
* openSUSE Leap 15.4
* SAP Applications Module 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that has four fixes can now be installed.
## Description:
This update for yast2-sap-ha fixes the following issues:
* Error occurred during the unattended installation (bsc#1221049)
* Rework yast2-sap-ha setup workflow (bsc#1217596)
* yast2-sap-ha wizard terminates abruptly when save configuration option is
selected post configuration (bsc#1214603)
* yast2-sap-ha does not set global_allocation_limit for non productive
database (bsc#1216651)
* Do not override values from saved configuration during initialization of the
modules
* Check if the required HANA systems are installed on the nodes
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1323=1
* SAP Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1323=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* yast2-sap-ha-4.4.8-150400.13.12.1
* SAP Applications Module 15-SP4 (noarch)
* yast2-sap-ha-4.4.8-150400.13.12.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214603
* https://bugzilla.suse.com/show_bug.cgi?id=1216651
* https://bugzilla.suse.com/show_bug.cgi?id=1217596
* https://bugzilla.suse.com/show_bug.cgi?id=1221049
1
0
17 Apr '24
# Recommended update for yast2-sap-ha
Announcement ID: SUSE-RU-2024:1324-1
Rating: moderate
References:
* bsc#1214603
* bsc#1216651
* bsc#1217596
* bsc#1221049
Affected Products:
* openSUSE Leap 15.5
* SAP Applications Module 15-SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for yast2-sap-ha fixes the following issues:
* Error occurred during the unattended installation (bsc#1221049)
* Rework yast2-sap-ha setup workflow (bsc#1217596)
* yast2-sap-ha wizard terminates abruptly when save configuration option is
selected post configuration (bsc#1214603)
* yast2-sap-ha does not set global_allocation_limit for non productive
database (bsc#1216651)
* Do not override values from saved configuration during initialization of the
modules
* Check if the required HANA systems are installed on the nodes
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1324=1 openSUSE-SLE-15.5-2024-1324=1
* SAP Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1324=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* yast2-sap-ha-4.5.11-150500.3.10.1
* SAP Applications Module 15-SP5 (noarch)
* yast2-sap-ha-4.5.11-150500.3.10.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214603
* https://bugzilla.suse.com/show_bug.cgi?id=1216651
* https://bugzilla.suse.com/show_bug.cgi?id=1217596
* https://bugzilla.suse.com/show_bug.cgi?id=1221049
1
0
16 Apr '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1320-1
Rating: important
References:
* bsc#1212514
* bsc#1220237
* bsc#1220320
* bsc#1220340
* bsc#1220366
* bsc#1220411
* bsc#1220413
* bsc#1220439
* bsc#1220443
* bsc#1220445
* bsc#1220466
* bsc#1220478
* bsc#1220482
* bsc#1220484
* bsc#1220486
* bsc#1220487
* bsc#1220790
* bsc#1220831
* bsc#1220833
* bsc#1220836
* bsc#1220839
* bsc#1220840
* bsc#1220843
* bsc#1220870
* bsc#1220871
* bsc#1220872
* bsc#1220878
* bsc#1220879
* bsc#1220885
* bsc#1220898
* bsc#1220918
* bsc#1220920
* bsc#1220921
* bsc#1220926
* bsc#1220927
* bsc#1220929
* bsc#1220932
* bsc#1220938
* bsc#1220940
* bsc#1220954
* bsc#1220955
* bsc#1220959
* bsc#1220960
* bsc#1220961
* bsc#1220965
* bsc#1220969
* bsc#1220978
* bsc#1220979
* bsc#1220981
* bsc#1220982
* bsc#1220983
* bsc#1220985
* bsc#1220986
* bsc#1220987
* bsc#1220989
* bsc#1220990
* bsc#1221009
* bsc#1221012
* bsc#1221015
* bsc#1221022
* bsc#1221039
* bsc#1221040
* bsc#1221048
* bsc#1221055
* bsc#1221058
* bsc#1221077
* bsc#1221276
* bsc#1221551
* bsc#1221553
* bsc#1221725
* bsc#1222073
* bsc#1222619
* jsc#PED-5759
Cross-References:
* CVE-2021-46925
* CVE-2021-46926
* CVE-2021-46927
* CVE-2021-46929
* CVE-2021-46930
* CVE-2021-46931
* CVE-2021-46933
* CVE-2021-46936
* CVE-2021-47082
* CVE-2021-47087
* CVE-2021-47091
* CVE-2021-47093
* CVE-2021-47094
* CVE-2021-47095
* CVE-2021-47096
* CVE-2021-47097
* CVE-2021-47098
* CVE-2021-47099
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47102
* CVE-2021-47104
* CVE-2021-47105
* CVE-2021-47107
* CVE-2021-47108
* CVE-2022-48626
* CVE-2022-48629
* CVE-2022-48630
* CVE-2023-35827
* CVE-2023-52450
* CVE-2023-52454
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52477
* CVE-2023-52492
* CVE-2023-52497
* CVE-2023-52501
* CVE-2023-52502
* CVE-2023-52504
* CVE-2023-52507
* CVE-2023-52508
* CVE-2023-52509
* CVE-2023-52510
* CVE-2023-52511
* CVE-2023-52513
* CVE-2023-52515
* CVE-2023-52517
* CVE-2023-52519
* CVE-2023-52520
* CVE-2023-52523
* CVE-2023-52524
* CVE-2023-52525
* CVE-2023-52528
* CVE-2023-52529
* CVE-2023-52532
* CVE-2023-52564
* CVE-2023-52566
* CVE-2023-52567
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52575
* CVE-2023-52576
* CVE-2023-52582
* CVE-2023-52583
* CVE-2023-52597
* CVE-2023-52605
* CVE-2023-52621
* CVE-2024-25742
* CVE-2024-26600
CVSS scores:
* CVE-2021-46925 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47093 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47094 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47096 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47107 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52497 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52510 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52567 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves 70 vulnerabilities, contains one feature and has two
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-
acpi (bsc#1220478).
* CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use
get_user_pages_unlocked() (bsc#1220443).
* CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump()
(bsc#1220482).
* CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
* CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq()
(bsc#1220486).
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
* CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
* CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path
(bsc#1220959).
* CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core
(bsc#1220978).
* CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
* CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
* CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi
(bsc#1220981).
* CVE-2021-47097: Fixed stack out of bound access in
elantech_change_report_id() (bsc#1220982).
* CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations
hwmon: (lm90) (bsc#1220983).
* CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are
cloned (bsc#1220955).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47102: Fixed incorrect structure access In line: upper =
info->upper_dev in net/marvell/prestera (bsc#1221009).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
* CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
* CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in
drm/mediatek (bsc#1220986).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
* CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in
crypto: qcom-rng (bsc#1220990).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology()
(bsc#1220237).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
* CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec
user SDMA requests (bsc#1220445).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration
function __dma_async_device_channel_register() (bsc#1221276).
* CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
* CVE-2023-52501: Fixed possible memory corruption in ring-buffer
(bsc#1220885).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a
5-level paging machine (bsc#1221553).
* CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
* CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid()
(bsc#1221015).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
* CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
* CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO
drain in spi/sun6i (bsc#1221055).
* CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc
(bsc#1220920).
* CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi
(bsc#1220921).
* CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf
(bsc#1220926).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet()
(bsc#1220840).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux()
(bsc#1220938).
* CVE-2023-52566: Fixed potential use after free in
nilfs_gccache_submit_read_data() (bsc#1220940).
* CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ
polling (irq = 0) (bsc#1220839).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52576: Fixed potential use after free in memblock_isolate_range()
(bsc#1220872).
* CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2
(bsc#1220340).
The following non-security bugs were fixed:
* doc/README.SUSE: Update information about module support status
(jsc#PED-5759)
* group-source-files.pl: Quote filenames (boo#1221077).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1320=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1320=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1320=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1320=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1320=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1320=1
## Package List:
* openSUSE Leap Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* openSUSE Leap Micro 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* openSUSE Leap Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* openSUSE Leap Micro 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* kernel-rt-debuginfo-5.14.21-150400.15.76.1
* kernel-rt-debugsource-5.14.21-150400.15.76.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.76.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-46926.html
* https://www.suse.com/security/cve/CVE-2021-46927.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46930.html
* https://www.suse.com/security/cve/CVE-2021-46931.html
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47082.html
* https://www.suse.com/security/cve/CVE-2021-47087.html
* https://www.suse.com/security/cve/CVE-2021-47091.html
* https://www.suse.com/security/cve/CVE-2021-47093.html
* https://www.suse.com/security/cve/CVE-2021-47094.html
* https://www.suse.com/security/cve/CVE-2021-47095.html
* https://www.suse.com/security/cve/CVE-2021-47096.html
* https://www.suse.com/security/cve/CVE-2021-47097.html
* https://www.suse.com/security/cve/CVE-2021-47098.html
* https://www.suse.com/security/cve/CVE-2021-47099.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47102.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47105.html
* https://www.suse.com/security/cve/CVE-2021-47107.html
* https://www.suse.com/security/cve/CVE-2021-47108.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48629.html
* https://www.suse.com/security/cve/CVE-2022-48630.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-52450.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52497.html
* https://www.suse.com/security/cve/CVE-2023-52501.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52504.html
* https://www.suse.com/security/cve/CVE-2023-52507.html
* https://www.suse.com/security/cve/CVE-2023-52508.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52510.html
* https://www.suse.com/security/cve/CVE-2023-52511.html
* https://www.suse.com/security/cve/CVE-2023-52513.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52517.html
* https://www.suse.com/security/cve/CVE-2023-52519.html
* https://www.suse.com/security/cve/CVE-2023-52520.html
* https://www.suse.com/security/cve/CVE-2023-52523.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52529.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52564.html
* https://www.suse.com/security/cve/CVE-2023-52566.html
* https://www.suse.com/security/cve/CVE-2023-52567.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52576.html
* https://www.suse.com/security/cve/CVE-2023-52582.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2023-52621.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26600.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1220237
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220340
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220413
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1220443
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1220478
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220484
* https://bugzilla.suse.com/show_bug.cgi?id=1220486
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220833
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220839
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220872
* https://bugzilla.suse.com/show_bug.cgi?id=1220878
* https://bugzilla.suse.com/show_bug.cgi?id=1220879
* https://bugzilla.suse.com/show_bug.cgi?id=1220885
* https://bugzilla.suse.com/show_bug.cgi?id=1220898
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220920
* https://bugzilla.suse.com/show_bug.cgi?id=1220921
* https://bugzilla.suse.com/show_bug.cgi?id=1220926
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220929
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1220938
* https://bugzilla.suse.com/show_bug.cgi?id=1220940
* https://bugzilla.suse.com/show_bug.cgi?id=1220954
* https://bugzilla.suse.com/show_bug.cgi?id=1220955
* https://bugzilla.suse.com/show_bug.cgi?id=1220959
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220961
* https://bugzilla.suse.com/show_bug.cgi?id=1220965
* https://bugzilla.suse.com/show_bug.cgi?id=1220969
* https://bugzilla.suse.com/show_bug.cgi?id=1220978
* https://bugzilla.suse.com/show_bug.cgi?id=1220979
* https://bugzilla.suse.com/show_bug.cgi?id=1220981
* https://bugzilla.suse.com/show_bug.cgi?id=1220982
* https://bugzilla.suse.com/show_bug.cgi?id=1220983
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220986
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1220989
* https://bugzilla.suse.com/show_bug.cgi?id=1220990
* https://bugzilla.suse.com/show_bug.cgi?id=1221009
* https://bugzilla.suse.com/show_bug.cgi?id=1221012
* https://bugzilla.suse.com/show_bug.cgi?id=1221015
* https://bugzilla.suse.com/show_bug.cgi?id=1221022
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221055
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221551
* https://bugzilla.suse.com/show_bug.cgi?id=1221553
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1222073
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://jira.suse.com/browse/PED-5759
1
0
16 Apr '24
# Recommended update for orarun
Announcement ID: SUSE-RU-2024:1315-1
Rating: moderate
References:
* bsc#1219103
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for orarun fixes the following issue:
* Fix checking for running agent during shutdown (bsc#1219103)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1315=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1315=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1315=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1315=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1315=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1315=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1315=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1315=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1315=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1315=1
## Package List:
* openSUSE Leap 15.4 (s390x x86_64 i586)
* orarun-2.1-150400.22.9.2
* openSUSE Leap 15.5 (s390x x86_64)
* orarun-2.1-150400.22.9.2
* Server Applications Module 15-SP5 (s390x x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Manager Proxy 4.3 (x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* orarun-2.1-150400.22.9.2
* SUSE Manager Server 4.3 (s390x x86_64)
* orarun-2.1-150400.22.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1219103
1
0
SUSE-SU-2024:1312-1: important: Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)
by OPENSUSE-UPDATES 16 Apr '24
by OPENSUSE-UPDATES 16 Apr '24
16 Apr '24
# Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1312-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_88 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1312=1 SUSE-2024-1313=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1312=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1313=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_18-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_12-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_63-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-7-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_18-debugsource-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_12-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-7-150400.2.1
* kernel-livepatch-5_14_21-150400_24_63-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-7-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1318-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)
by OPENSUSE-UPDATES 16 Apr '24
by OPENSUSE-UPDATES 16 Apr '24
16 Apr '24
# Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1318-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_97 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1318=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1318=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-5-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-5-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1304-1: moderate: Security update for eclipse, maven-surefire, tycho
by OPENSUSE-UPDATES 16 Apr '24
by OPENSUSE-UPDATES 16 Apr '24
16 Apr '24
# Security update for eclipse, maven-surefire, tycho
Announcement ID: SUSE-SU-2024:1304-1
Rating: moderate
References:
* bsc#1216992
Cross-References:
* CVE-2023-4218
CVSS scores:
* CVE-2023-4218 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-4218 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for eclipse, maven-surefire, tycho fixes the following issues:
eclipse received the following security fix:
* CVE-2023-4218: Fixed a bug where parsing files with xml content laeds to XXE
attacks. (bsc#1216992)
maven-sunfire was updated from version 2.22.0 to 2.22.2:
* Changes in version 2.22.2:
* Bugs fixed:
* Fixed JUnit Runner that writes to System.out corrupts Surefire’s STDOUT when using JUnit’s Vintage Engine
* Changes in version 2.22.1:
* Bugs fixed:
* Fixed Surefire unable to run testng suites in parallel
* Fixed Git wrongly considering PNG files as changed when there is no change
* Fixed the surefire XSD published on maven site lacking of some rerun element
* Fixed XML Report elements rerunError, rerunFailure, flakyFailure, flakyError
* Fixed overriding platform version through project/plugin dependencies
* Fixed mixed up characters in standard output
* Logs in Parallel Tests are mixed up when `forkMode=never` or `forkCount=0`
* MIME type for javascript is now officially application/javascript
* Improvements:
* Elapsed time in XML Report should satisfy pattern in XSD.
* Fix old test resources TEST-*.xml in favor of continuing with SUREFIRE-1550
* Nil element “failureMessage” in failsafe-summary.xml should have self closed tag
* Removed obsolete module `surefire-setup-integration-tests`
* Support Java 11
* Surefire should support parameterized reportsDirectory
* Dependency upgrades:
* Upgraded maven-plugins parent to version 32
* Upgraded maven-plugins parent to version 33
tycho received the following bug fixes:
* Fixed build against maven-surefire 2.22.1 and newer
* Fixed build against newer plexus-compiler
* Fixed issues with plexus-archiver 4.4.0 and newer
* Require explicitely artifacts that will not be required automatically any
more
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1304=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1304=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1304=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1304=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1304=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1304=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1304=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1304=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1304=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1304=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1304=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1304=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1304=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1304=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1304=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Enterprise Storage 7.1 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* eclipse-platform-debuginfo-4.15-150200.4.16.4
* eclipse-swt-debuginfo-4.15-150200.4.16.4
* eclipse-swt-4.15-150200.4.16.4
* eclipse-swt-bootstrap-4.15-150200.4.16.5
* eclipse-platform-4.15-150200.4.16.4
* eclipse-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-emf-core-2.22.0-150200.4.9.3
* eclipse-emf-core-bootstrap-2.22.0-150200.4.9.3
* eclipse-equinox-osgi-4.15-150200.4.16.4
* eclipse-swt-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-pde-bootstrap-4.15-150200.4.16.5
* eclipse-contributor-tools-4.15-150200.4.16.4
* eclipse-platform-bootstrap-4.15-150200.4.16.5
* eclipse-platform-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-debuginfo-4.15-150200.4.16.4
* eclipse-bootstrap-debugsource-4.15-150200.4.16.5
* eclipse-pde-4.15-150200.4.16.4
* eclipse-equinox-osgi-bootstrap-4.15-150200.4.16.5
* eclipse-debugsource-4.15-150200.4.16.4
* openSUSE Leap 15.5 (noarch)
* eclipse-emf-xsd-2.22.0-150200.4.9.3
* eclipse-p2-discovery-4.15-150200.4.16.4
* maven-failsafe-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-report-parser-2.22.2-150200.3.9.9.1
* tycho-javadoc-1.6.0-150200.4.9.5
* tycho-1.6.0-150200.4.9.5
* maven-surefire-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* eclipse-emf-sdk-2.22.0-150200.4.9.3
* maven-surefire-javadoc-2.22.2-150200.3.9.9.1
* eclipse-p2-discovery-bootstrap-4.15-150200.4.16.5
* eclipse-jdt-bootstrap-4.15-150200.4.16.5
* maven-surefire-report-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-plugins-javadoc-2.22.2-150200.3.9.9.1
* eclipse-emf-runtime-2.22.0-150200.4.9.3
* maven-surefire-provider-junit5-javadoc-2.22.2-150200.3.9.9.1
* eclipse-jdt-4.15-150200.4.16.4
* tycho-bootstrap-1.6.0-150200.4.9.2
* maven-surefire-report-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit5-2.22.2-150200.3.9.9.1
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-failsafe-plugin-2.22.2-150200.3.9.9.1
* Development Tools Module 15-SP5 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* eclipse-platform-debuginfo-4.15-150200.4.16.4
* eclipse-swt-debuginfo-4.15-150200.4.16.4
* eclipse-swt-4.15-150200.4.16.4
* eclipse-swt-bootstrap-4.15-150200.4.16.5
* eclipse-platform-4.15-150200.4.16.4
* eclipse-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-emf-core-2.22.0-150200.4.9.3
* eclipse-emf-core-bootstrap-2.22.0-150200.4.9.3
* eclipse-equinox-osgi-4.15-150200.4.16.4
* eclipse-swt-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-pde-bootstrap-4.15-150200.4.16.5
* eclipse-contributor-tools-4.15-150200.4.16.4
* eclipse-platform-bootstrap-4.15-150200.4.16.5
* eclipse-platform-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-debuginfo-4.15-150200.4.16.4
* eclipse-bootstrap-debugsource-4.15-150200.4.16.5
* eclipse-pde-4.15-150200.4.16.4
* eclipse-equinox-osgi-bootstrap-4.15-150200.4.16.5
* eclipse-debugsource-4.15-150200.4.16.4
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-4218.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216992
1
0
16 Apr '24
# Security update for nodejs16
Announcement ID: SUSE-SU-2024:1306-1
Rating: important
References:
* bsc#1222244
* bsc#1222384
Cross-References:
* CVE-2024-27982
* CVE-2024-27983
CVSS scores:
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for nodejs16 fixes the following issues:
* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1306=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1306=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1306=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1306=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* corepack16-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* openSUSE Leap 15.3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Enterprise Storage 7.1 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
## References:
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
1
0
16 Apr '24
# Security update for nodejs16
Announcement ID: SUSE-SU-2024:1308-1
Rating: important
References:
* bsc#1222244
* bsc#1222384
Cross-References:
* CVE-2024-27982
* CVE-2024-27983
CVSS scores:
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for nodejs16 fixes the following issues:
* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1308=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1308=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1308=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1308=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1308=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1308=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* corepack16-16.20.2-150400.3.33.1
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* openSUSE Leap 15.4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Manager Server 4.3 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
## References:
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
1
0
16 Apr '24
# Security update for nodejs18
Announcement ID: SUSE-SU-2024:1309-1
Rating: important
References:
* bsc#1220053
* bsc#1222244
* bsc#1222384
* bsc#1222530
* bsc#1222603
Cross-References:
* CVE-2024-24806
* CVE-2024-27982
* CVE-2024-27983
* CVE-2024-30260
* CVE-2024-30261
CVSS scores:
* CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-30260 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-30261 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP5
An update that solves five vulnerabilities can now be installed.
## Description:
This update for nodejs18 fixes the following issues:
Update to 18.20.1
Security fixes:
* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
* CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin
redirect in undici (bsc#1222530)
* CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm
is specified but hash value is in incorrect in undici (bsc#1222603)
* CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF
attacks in libuv (bsc#1220053)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1309=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1309=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1309=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1309=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1309=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1309=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1309=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1309=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* corepack18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* openSUSE Leap 15.4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* corepack18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* openSUSE Leap 15.5 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* Web and Scripting Module 15-SP5 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Manager Server 4.3 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
## References:
* https://www.suse.com/security/cve/CVE-2024-24806.html
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://www.suse.com/security/cve/CVE-2024-30260.html
* https://www.suse.com/security/cve/CVE-2024-30261.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220053
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
* https://bugzilla.suse.com/show_bug.cgi?id=1222530
* https://bugzilla.suse.com/show_bug.cgi?id=1222603
1
0
# Security update for texlive
Announcement ID: SUSE-SU-2024:1310-1
Rating: low
References:
* bsc#1222126
* bsc#1222127
Cross-References:
* CVE-2023-46048
* CVE-2023-46051
CVSS scores:
* CVE-2023-46048 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-46051 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for texlive fixes the following issues:
* CVE-2023-46048: Fixed NULL pointer dereference in
texk/web2c/pdftexdir/writet1.c (bsc#1222126)
* CVE-2023-46051: Fixed NULL pointer dereference in
texk/web2c/pdftexdir/tounicode.c (bsc#1222127)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1310=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1310=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1310=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1310=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* openSUSE Leap 15.4 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* openSUSE Leap 15.5 (aarch64 x86_64)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* openSUSE Leap 15.5 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* Basesystem Module 15-SP5 (noarch)
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* Desktop Applications Module 15-SP5 (aarch64 x86_64)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* Desktop Applications Module 15-SP5 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4
## References:
* https://www.suse.com/security/cve/CVE-2023-46048.html
* https://www.suse.com/security/cve/CVE-2023-46051.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222126
* https://bugzilla.suse.com/show_bug.cgi?id=1222127
1
0
16 Apr '24
# Security update for nodejs20
Announcement ID: SUSE-SU-2024:1301-1
Rating: important
References:
* bsc#1220053
* bsc#1222244
* bsc#1222384
* bsc#1222530
* bsc#1222603
Cross-References:
* CVE-2024-24806
* CVE-2024-27982
* CVE-2024-27983
* CVE-2024-30260
* CVE-2024-30261
CVSS scores:
* CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-30260 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-30261 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves five vulnerabilities can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
Update to 20.12.1
Security fixes:
* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
* CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin
redirect in undici (bsc#1222530)
* CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm
is specified but hash value is in incorrect in undici (bsc#1222603)
* CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF
attacks in libuv (bsc#1220053)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1301=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1301=1 openSUSE-SLE-15.5-2024-1301=1
## Package List:
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.12.1-150500.11.9.2
* nodejs20-debuginfo-20.12.1-150500.11.9.2
* nodejs20-devel-20.12.1-150500.11.9.2
* npm20-20.12.1-150500.11.9.2
* nodejs20-20.12.1-150500.11.9.2
* Web and Scripting Module 15-SP5 (noarch)
* nodejs20-docs-20.12.1-150500.11.9.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* nodejs20-debugsource-20.12.1-150500.11.9.2
* corepack20-20.12.1-150500.11.9.2
* nodejs20-debuginfo-20.12.1-150500.11.9.2
* nodejs20-devel-20.12.1-150500.11.9.2
* npm20-20.12.1-150500.11.9.2
* nodejs20-20.12.1-150500.11.9.2
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.12.1-150500.11.9.2
## References:
* https://www.suse.com/security/cve/CVE-2024-24806.html
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://www.suse.com/security/cve/CVE-2024-30260.html
* https://www.suse.com/security/cve/CVE-2024-30261.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220053
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
* https://bugzilla.suse.com/show_bug.cgi?id=1222530
* https://bugzilla.suse.com/show_bug.cgi?id=1222603
1
0
SUSE-RU-2024:1302-1: critical: Recommended update for python-azure-agent
by OPENSUSE-UPDATES 16 Apr '24
by OPENSUSE-UPDATES 16 Apr '24
16 Apr '24
# Recommended update for python-azure-agent
Announcement ID: SUSE-RU-2024:1302-1
Rating: critical
References:
* bsc#1222620
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for python-azure-agent fixes the following issues:
* Keep the existing config file (bsc#1222620)
* Do not force wicked dependency for networking, allow NM in SLE Micro 5.5 and
for ALP based products
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1302=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1302=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1302=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1302=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1302=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1302=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1302=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* python-azure-agent-test-2.9.1.1-150100.3.32.3
* Public Cloud Module 15-SP2 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* python-azure-agent-config-server-2.9.1.1-150100.3.32.3
* python-azure-agent-config-default-2.9.1.1-150100.3.32.3
* python-azure-agent-config-micro-2.9.1.1-150100.3.32.3
* python-azure-agent-config-hpc-2.9.1.1-150100.3.32.3
* Public Cloud Module 15-SP3 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* python-azure-agent-config-server-2.9.1.1-150100.3.32.3
* python-azure-agent-config-default-2.9.1.1-150100.3.32.3
* python-azure-agent-config-micro-2.9.1.1-150100.3.32.3
* python-azure-agent-config-hpc-2.9.1.1-150100.3.32.3
* Public Cloud Module 15-SP4 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* python-azure-agent-config-server-2.9.1.1-150100.3.32.3
* python-azure-agent-config-default-2.9.1.1-150100.3.32.3
* python-azure-agent-config-micro-2.9.1.1-150100.3.32.3
* python-azure-agent-config-hpc-2.9.1.1-150100.3.32.3
* Public Cloud Module 15-SP5 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* python-azure-agent-config-server-2.9.1.1-150100.3.32.3
* python-azure-agent-config-default-2.9.1.1-150100.3.32.3
* python-azure-agent-config-micro-2.9.1.1-150100.3.32.3
* python-azure-agent-config-hpc-2.9.1.1-150100.3.32.3
* SUSE Linux Enterprise Micro 5.2 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* python-azure-agent-2.9.1.1-150100.3.32.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222620
1
0
# Security update for emacs
Announcement ID: SUSE-SU-2024:1294-1
Rating: moderate
References:
* bsc#1222050
* bsc#1222052
* bsc#1222053
Cross-References:
* CVE-2024-30203
* CVE-2024-30204
* CVE-2024-30205
CVSS scores:
* CVE-2024-30203 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-30204 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-30205 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for emacs fixes the following issues:
* CVE-2024-30203: Fixed treating inline MIME contents as trusted (bsc#1222053)
* CVE-2024-30204: Fixed LaTeX preview enabled by default for e-mail
attachments (bsc#1222052)
* CVE-2024-30205: Fixed Org mode considering contents of remote files as
trusted (bsc#1222050)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1294=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1294=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1294=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1294=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* emacs-x11-27.2-150400.3.11.1
* etags-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* openSUSE Leap 15.4 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* emacs-x11-27.2-150400.3.11.1
* etags-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* openSUSE Leap 15.5 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* etags-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* Basesystem Module 15-SP5 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* emacs-x11-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30203.html
* https://www.suse.com/security/cve/CVE-2024-30204.html
* https://www.suse.com/security/cve/CVE-2024-30205.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222050
* https://bugzilla.suse.com/show_bug.cgi?id=1222052
* https://bugzilla.suse.com/show_bug.cgi?id=1222053
1
0
# Security update for xen
Announcement ID: SUSE-SU-2024:1295-1
Rating: moderate
References:
* bsc#1027519
* bsc#1221984
* bsc#1222302
* bsc#1222453
Cross-References:
* CVE-2023-46842
* CVE-2024-2201
* CVE-2024-31142
CVSS scores:
* CVE-2023-46842 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-31142 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-46842: Fixed denial of service due to Xen bug check triggered by
HVM hypercalls (XSA-454) in xen x86 (bsc#1221984)
* CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455) in
xen x86 (bsc#1222302)
* CVE-2024-2201: Fixed memory disclosure via Native Branch History Injection
(XSA-456) in xen x86 (bsc#1222453)
Other fixes:
* Update to Xen 4.17.4 (bsc#1027519)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1295=1 SUSE-2024-1295=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1295=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1295=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1295=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* xen-tools-debuginfo-4.17.4_02-150500.3.30.1
* xen-tools-4.17.4_02-150500.3.30.1
* xen-doc-html-4.17.4_02-150500.3.30.1
* xen-4.17.4_02-150500.3.30.1
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* xen-libs-debuginfo-4.17.4_02-150500.3.30.1
* xen-devel-4.17.4_02-150500.3.30.1
* xen-debugsource-4.17.4_02-150500.3.30.1
* xen-tools-domU-4.17.4_02-150500.3.30.1
* xen-libs-4.17.4_02-150500.3.30.1
* xen-tools-domU-debuginfo-4.17.4_02-150500.3.30.1
* openSUSE Leap 15.5 (x86_64)
* xen-libs-32bit-debuginfo-4.17.4_02-150500.3.30.1
* xen-libs-32bit-4.17.4_02-150500.3.30.1
* openSUSE Leap 15.5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.4_02-150500.3.30.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.17.4_02-150500.3.30.1
* xen-libs-64bit-4.17.4_02-150500.3.30.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* xen-libs-4.17.4_02-150500.3.30.1
* xen-debugsource-4.17.4_02-150500.3.30.1
* xen-libs-debuginfo-4.17.4_02-150500.3.30.1
* Basesystem Module 15-SP5 (x86_64)
* xen-libs-debuginfo-4.17.4_02-150500.3.30.1
* xen-debugsource-4.17.4_02-150500.3.30.1
* xen-tools-domU-4.17.4_02-150500.3.30.1
* xen-libs-4.17.4_02-150500.3.30.1
* xen-tools-domU-debuginfo-4.17.4_02-150500.3.30.1
* Server Applications Module 15-SP5 (x86_64)
* xen-devel-4.17.4_02-150500.3.30.1
* xen-debugsource-4.17.4_02-150500.3.30.1
* xen-tools-debuginfo-4.17.4_02-150500.3.30.1
* xen-tools-4.17.4_02-150500.3.30.1
* xen-4.17.4_02-150500.3.30.1
* Server Applications Module 15-SP5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.4_02-150500.3.30.1
## References:
* https://www.suse.com/security/cve/CVE-2023-46842.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-31142.html
* https://bugzilla.suse.com/show_bug.cgi?id=1027519
* https://bugzilla.suse.com/show_bug.cgi?id=1221984
* https://bugzilla.suse.com/show_bug.cgi?id=1222302
* https://bugzilla.suse.com/show_bug.cgi?id=1222453
1
0
SUSE-SU-2024:1298-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1298-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_103 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1297=1 SUSE-2024-1298=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1297=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1298=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_103-default-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-3-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-5-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_103-default-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-5-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-5-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-3-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-3-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-5-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1299-1: important: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4)
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1299-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_60 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1299=1 SUSE-2024-1300=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1299=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1300=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_10-debugsource-13-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_11-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_55-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_60-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_10-debugsource-13-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_11-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_55-default-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_60-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-13-150400.2.1
* kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-12-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
# Security update for vim
Announcement ID: SUSE-SU-2024:1287-1
Rating: important
References:
* bsc#1215005
* bsc#1217316
* bsc#1217320
* bsc#1217321
* bsc#1217324
* bsc#1217326
* bsc#1217329
* bsc#1217330
* bsc#1217432
* bsc#1219581
Cross-References:
* CVE-2023-4750
* CVE-2023-48231
* CVE-2023-48232
* CVE-2023-48233
* CVE-2023-48234
* CVE-2023-48235
* CVE-2023-48236
* CVE-2023-48237
* CVE-2023-48706
* CVE-2024-22667
CVSS scores:
* CVE-2023-4750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4750 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-48231 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48231 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48232 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48232 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48233 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48233 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48234 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48234 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48235 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48235 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48236 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
* CVE-2023-48236 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48237 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48237 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48706 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48706 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-22667 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 10 vulnerabilities can now be installed.
## Description:
This update for vim fixes the following issues:
Updated to version 9.1.0111, fixes the following security problems
* CVE-2023-48231: Use-After-Free in win_close() (bsc#1217316).
* CVE-2023-48232: Floating point Exception in adjust_plines_for_skipcol()
(bsc#1217320).
* CVE-2023-48233: overflow with count for :s command (bsc#1217321).
* CVE-2023-48234: overflow in nv_z_get_count (bsc#1217324).
* CVE-2023-48235: overflow in ex address parsing (CVE-2023-48235).
* CVE-2023-48236: overflow in get_number (bsc#1217329).
* CVE-2023-48237: overflow in shift_line (bsc#1217330).
* CVE-2023-48706: heap-use-after-free in ex_substitute (bsc#1217432).
* CVE-2024-22667: stack-based buffer overflow in did_set_langmap function in
map.c (bsc#1219581).
* CVE-2023-4750: Heap use-after-free in function bt_quickfix (bsc#1215005).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1287=1 openSUSE-SLE-15.5-2024-1287=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1287=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1287=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1287=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* gvim-debuginfo-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* vim-9.1.0111-150500.20.9.1
* vim-small-9.1.0111-150500.20.9.1
* gvim-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* openSUSE Leap 15.5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* vim-data-9.1.0111-150500.20.9.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* vim-small-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* vim-9.1.0111-150500.20.9.1
* vim-small-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* Basesystem Module 15-SP5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* vim-data-9.1.0111-150500.20.9.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gvim-debuginfo-9.1.0111-150500.20.9.1
* gvim-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-4750.html
* https://www.suse.com/security/cve/CVE-2023-48231.html
* https://www.suse.com/security/cve/CVE-2023-48232.html
* https://www.suse.com/security/cve/CVE-2023-48233.html
* https://www.suse.com/security/cve/CVE-2023-48234.html
* https://www.suse.com/security/cve/CVE-2023-48235.html
* https://www.suse.com/security/cve/CVE-2023-48236.html
* https://www.suse.com/security/cve/CVE-2023-48237.html
* https://www.suse.com/security/cve/CVE-2023-48706.html
* https://www.suse.com/security/cve/CVE-2024-22667.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215005
* https://bugzilla.suse.com/show_bug.cgi?id=1217316
* https://bugzilla.suse.com/show_bug.cgi?id=1217320
* https://bugzilla.suse.com/show_bug.cgi?id=1217321
* https://bugzilla.suse.com/show_bug.cgi?id=1217324
* https://bugzilla.suse.com/show_bug.cgi?id=1217326
* https://bugzilla.suse.com/show_bug.cgi?id=1217329
* https://bugzilla.suse.com/show_bug.cgi?id=1217330
* https://bugzilla.suse.com/show_bug.cgi?id=1217432
* https://bugzilla.suse.com/show_bug.cgi?id=1219581
1
0
SUSE-SU-2024:1288-1: important: Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1288-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_81 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1288=1 SUSE-2024-1289=1 SUSE-2024-1290=1
SUSE-2024-1291=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1291=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-1288=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2024-1289=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-1290=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_66-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_14-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_13-debugsource-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_15-debugsource-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_16-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_69-default-9-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_66-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_14-debugsource-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_13-debugsource-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_15-debugsource-9-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_16-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_81-default-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_74-default-9-150400.2.1
* kernel-livepatch-5_14_21-150400_24_69-default-9-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1292-1: important: Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1292-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_92 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1292=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1292=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_92-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_19-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-6-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_92-default-6-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_19-debugsource-6-150400.2.1
* kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-6-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
15 Apr '24
# Recommended update for yast2-packager
Announcement ID: SUSE-RU-2024:1284-1
Rating: moderate
References:
* bsc#1201816
* bsc#1220567
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for yast2-packager, yast2-registration fixes the following issues:
* Reimplemented hardcoded product mapping to support the migration from
SLE_HPC to SLES SP6+ (bsc#1220567)
* Do not fail when the installation URL contains a space (bsc#1201816)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1284=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1284=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1284=1 SUSE-SLE-
INSTALLER-15-SP4-2024-1284=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1284=1 SUSE-SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1284=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1284=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1284=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1284=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1284=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1284=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* yast2-packager-4.4.35-150400.3.11.1
* openSUSE Leap 15.4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Manager Server 4.3 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Manager Proxy 4.3 (x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Manager Proxy 4.3 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* yast2-packager-4.4.35-150400.3.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* yast2-registration-4.4.24-150400.3.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1201816
* https://bugzilla.suse.com/show_bug.cgi?id=1220567
1
0
SUSE-RU-2024:1285-1: moderate: Recommended update for yast2, yast2-packager
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Recommended update for yast2, yast2-packager
Announcement ID: SUSE-RU-2024:1285-1
Rating: moderate
References:
* bsc#1220567
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has one fix can now be installed.
## Description:
This update for yast2, yast2-packager fixes the following issue:
* Reimplemented the hardcoded product mapping to support also the migration
from SLE_HPC to SLES SP6+ (with the HPC module) (bsc#1220567)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1285=1
* SUSE Linux Enterprise Server 15 SP3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-1285=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1285=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1285=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1285=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1285=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1285=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1285=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1285=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-logs-4.3.70-150300.3.23.3
* yast2-4.3.70-150300.3.23.3
* openSUSE Leap 15.3 (noarch)
* yast2-registration-4.3.29-150300.3.23.2
* SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-4.3.70-150300.3.23.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-logs-4.3.70-150300.3.23.3
* yast2-4.3.70-150300.3.23.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* yast2-registration-4.3.29-150300.3.23.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-logs-4.3.70-150300.3.23.3
* yast2-4.3.70-150300.3.23.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* yast2-registration-4.3.29-150300.3.23.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-logs-4.3.70-150300.3.23.3
* yast2-4.3.70-150300.3.23.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* yast2-registration-4.3.29-150300.3.23.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* yast2-packager-4.3.27-150300.3.15.2
* yast2-logs-4.3.70-150300.3.23.3
* yast2-4.3.70-150300.3.23.3
* SUSE Enterprise Storage 7.1 (noarch)
* yast2-registration-4.3.29-150300.3.23.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* yast2-logs-4.3.70-150300.3.23.3
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* yast2-logs-4.3.70-150300.3.23.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* yast2-logs-4.3.70-150300.3.23.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220567
1
0
15 Apr '24
# Recommended update for flatpak
Announcement ID: SUSE-RU-2024:1281-1
Rating: moderate
References:
* bsc#1221662
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for flatpak fixes the following issues:
* Exclude Flathub repository in the default setup (bsc#1221662)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1281=1 SUSE-2024-1281=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1281=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Flatpak-1_0-1.14.5-150500.3.6.1
* libflatpak0-1.14.5-150500.3.6.1
* flatpak-debugsource-1.14.5-150500.3.6.1
* flatpak-devel-1.14.5-150500.3.6.1
* flatpak-debuginfo-1.14.5-150500.3.6.1
* flatpak-1.14.5-150500.3.6.1
* libflatpak0-debuginfo-1.14.5-150500.3.6.1
* openSUSE Leap 15.5 (noarch)
* flatpak-zsh-completion-1.14.5-150500.3.6.1
* system-user-flatpak-1.14.5-150500.3.6.1
* flatpak-remote-flathub-1.14.5-150500.3.6.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Flatpak-1_0-1.14.5-150500.3.6.1
* libflatpak0-1.14.5-150500.3.6.1
* flatpak-debugsource-1.14.5-150500.3.6.1
* flatpak-devel-1.14.5-150500.3.6.1
* flatpak-debuginfo-1.14.5-150500.3.6.1
* flatpak-1.14.5-150500.3.6.1
* libflatpak0-debuginfo-1.14.5-150500.3.6.1
* Desktop Applications Module 15-SP5 (noarch)
* flatpak-zsh-completion-1.14.5-150500.3.6.1
* system-user-flatpak-1.14.5-150500.3.6.1
* flatpak-remote-flathub-1.14.5-150500.3.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221662
1
0
SUSE-SU-2024:1280-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
by OPENSUSE-UPDATES 15 Apr '24
by OPENSUSE-UPDATES 15 Apr '24
15 Apr '24
# Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:1280-1
Rating: important
References:
* bsc#1219296
Cross-References:
* CVE-2023-52340
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_108 fixes one issue.
The following security issue was fixed:
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1280=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1280=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_108-default-2-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-2-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-2-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_108-default-2-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-2-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-2-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
openSUSE-SU-2024:0109-1: important: Security update for opera
by opensuse-security@opensuse.org 13 Apr '24
by opensuse-security@opensuse.org 13 Apr '24
13 Apr '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0109-1
Rating: important
References:
Cross-References: CVE-2024-2883 CVE-2024-2885 CVE-2024-2886
CVE-2024-2887
Affected Products:
openSUSE Leap 15.5:NonFree
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
- Update to 109.0.5097.38
* CHR-9695 Update Chromium on desktop-stable-123-5097 to 123.0.6312.87
* DNA-115156 [Login and Password suggestion] Suggestions are bolded and
highlight doesn`t fill all area
* DNA-115313 No video playback on skyshowtime.com
* DNA-115639 [Version 109][Detached window] Missing functions names in
light mode
* DNA-115812 Enable #startpage-opening-animation on all streams
* DNA-115836 Lucid mode visual issues on H264 videos
- The update to chromium 109.0.5097.38 fixes following issues:
CVE-2024-2883, CVE-2024-2885, CVE-2024-2886, CVE-2024-2887
- Update to 109.0.5097.33
* CHR-9674 Update Chromium on desktop-stable-123-5097 to 123.0.6312.46
* DNA-115357 [Settings] Search toolbar has wrong position
* DNA-115396 Bolded camera icon when camera access is allowed
* DNA-115478 AI Prompts in text highlight popup not displayed properly
* DNA-115563 Wallet selector not working
* DNA-115601 Remove 'moving text' animation in the tab cycler
* DNA-115645 Internal pages icons unreadable when highlight
* DNA-115717 'Your extension was disabled because it is corrupted'
message is displayed to user
* DNA-115770 Promote 109 to stable
- Complete Opera 109 changelog at:
https://blogs.opera.com/desktop/changelog-for-109/
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.5:NonFree:
zypper in -t patch openSUSE-2024-109=1
Package List:
- openSUSE Leap 15.5:NonFree (x86_64):
opera-109.0.5097.38-lp155.3.42.1
References:
https://www.suse.com/security/cve/CVE-2024-2883.html
https://www.suse.com/security/cve/CVE-2024-2885.html
https://www.suse.com/security/cve/CVE-2024-2886.html
https://www.suse.com/security/cve/CVE-2024-2887.html
1
0
12 Apr '24
# Recommended update for python3
Announcement ID: SUSE-RU-2024:1279-1
Rating: moderate
References:
* bsc#1222109
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for python3 fixes the following issue:
* Fix syslog making default "ident" from sys.argv (bsc#1222109)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1279=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1279=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1279=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1279=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1279=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1279=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1279=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1279=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1279=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1279=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1279=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1279=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1279=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1279=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1279=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1279=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1279=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1279=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1279=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1279=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1279=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1279=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1279=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1279=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1279=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-doc-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-doc-devhelp-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* python3-testsuite-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-testsuite-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-32bit-3.6.15-150300.10.60.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_6m1_0-64bit-3.6.15-150300.10.60.1
* libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.60.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-doc-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-doc-devhelp-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* python3-testsuite-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-testsuite-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* openSUSE Leap 15.5 (x86_64)
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-32bit-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-tools-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Manager Proxy 4.3 (x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* python3-devel-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-tools-3.6.15-150300.10.60.1
* python3-curses-debuginfo-3.6.15-150300.10.60.1
* python3-idle-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-dbm-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-tk-3.6.15-150300.10.60.1
* python3-tk-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* python3-dbm-debuginfo-3.6.15-150300.10.60.1
* python3-devel-debuginfo-3.6.15-150300.10.60.1
* python3-curses-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.60.1
* python3-base-debuginfo-3.6.15-150300.10.60.1
* libpython3_6m1_0-3.6.15-150300.10.60.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.60.1
* python3-3.6.15-150300.10.60.1
* python3-core-debugsource-3.6.15-150300.10.60.1
* python3-debuginfo-3.6.15-150300.10.60.1
* python3-debugsource-3.6.15-150300.10.60.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222109
1
0
SUSE-SU-2024:1276-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1276-1
Rating: important
References:
* bsc#1210619
* bsc#1218487
Cross-References:
* CVE-2023-1829
* CVE-2023-6531
CVSS scores:
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues.
The following security issues were fixed:
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic()on
the socket that the SKB is queued on (bsc#1218487).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210619).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1276=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1277=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1277=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-2-150200.5.6.1
* kernel-livepatch-SLE15-SP2_Update_46-debugsource-2-150200.5.6.1
* kernel-livepatch-5_3_18-150200_24_183-default-2-150200.5.6.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_153-default-2-150300.7.6.1
* kernel-livepatch-SLE15-SP3_Update_42-debugsource-2-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-2-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-2-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-preempt-2-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_153-default-2-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210619
* https://bugzilla.suse.com/show_bug.cgi?id=1218487
1
0
SUSE-SU-2024:1278-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1278-1
Rating: important
References:
* bsc#1219296
Cross-References:
* CVE-2023-52340
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_49 fixes one issue.
The following security issue was fixed:
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1278=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1278=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-2-150500.11.8.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-2-150500.11.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
12 Apr '24
# Security update for python-Pillow
Announcement ID: SUSE-SU-2024:1258-1
Rating: important
References:
* bsc#1222262
* bsc#1222553
Cross-References:
* CVE-2024-28219
CVSS scores:
* CVE-2024-28219 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for python-Pillow fixes the following issues:
* CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262)
Other fixes: \- Re-enabled build tests for s390x and ppc (bsc#1222553)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1258=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1258=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1258=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1258=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1258=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1258=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1258=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1258=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-debuginfo-9.5.0-150400.5.15.1
* python311-Pillow-tk-9.5.0-150400.5.15.1
* python311-Pillow-9.5.0-150400.5.15.1
* python-Pillow-debugsource-9.5.0-150400.5.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28219.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222262
* https://bugzilla.suse.com/show_bug.cgi?id=1222553
1
0
12 Apr '24
# Security update for xorg-x11-server
Announcement ID: SUSE-SU-2024:1260-1
Rating: important
References:
* bsc#1222309
* bsc#1222310
* bsc#1222311
* bsc#1222312
* bsc#1222442
Cross-References:
* CVE-2024-31080
* CVE-2024-31081
* CVE-2024-31082
* CVE-2024-31083
CVSS scores:
* CVE-2024-31080 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31081 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31082 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2024-31083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xorg-x11-server fixes the following issues:
* CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length
(bsc#1222309).
* CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to
send reply (bsc#1222310).
* CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to
send reply (bsc#1222311).
* CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs
(bsc#1222312).
Other fixes: \- Fixed regression for security fix for CVE-2024-31083 when using
Android Studio (bnc#1222442)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1260=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1260=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1260=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1260=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1260=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1260=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1260=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-source-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-sdk-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Manager Proxy 4.3 (x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* xorg-x11-server-extra-1.20.3-150400.38.48.1
* xorg-x11-server-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-extra-debuginfo-1.20.3-150400.38.48.1
* xorg-x11-server-debugsource-1.20.3-150400.38.48.1
* xorg-x11-server-1.20.3-150400.38.48.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31080.html
* https://www.suse.com/security/cve/CVE-2024-31081.html
* https://www.suse.com/security/cve/CVE-2024-31082.html
* https://www.suse.com/security/cve/CVE-2024-31083.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222309
* https://bugzilla.suse.com/show_bug.cgi?id=1222310
* https://bugzilla.suse.com/show_bug.cgi?id=1222311
* https://bugzilla.suse.com/show_bug.cgi?id=1222312
* https://bugzilla.suse.com/show_bug.cgi?id=1222442
1
0
12 Apr '24
# Security update for xorg-x11-server
Announcement ID: SUSE-SU-2024:1262-1
Rating: important
References:
* bsc#1222309
* bsc#1222310
* bsc#1222311
* bsc#1222312
* bsc#1222442
Cross-References:
* CVE-2024-31080
* CVE-2024-31081
* CVE-2024-31082
* CVE-2024-31083
CVSS scores:
* CVE-2024-31080 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31081 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31082 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2024-31083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xorg-x11-server fixes the following issues:
* CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length
(bsc#1222309).
* CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to
send reply (bsc#1222310).
* CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to
send reply (bsc#1222311).
* CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs
(bsc#1222312).
Other fixes: \- Fixed regression for security fix for CVE-2024-31083 when using
Android Studio (bnc#1222442)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1262=1 openSUSE-SLE-15.5-2024-1262=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1262=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1262=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* xorg-x11-server-extra-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
* xorg-x11-server-source-21.1.4-150500.7.26.1
* xorg-x11-server-extra-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-sdk-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-21.1.4-150500.7.26.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xorg-x11-server-extra-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
* xorg-x11-server-extra-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-21.1.4-150500.7.26.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-sdk-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31080.html
* https://www.suse.com/security/cve/CVE-2024-31081.html
* https://www.suse.com/security/cve/CVE-2024-31082.html
* https://www.suse.com/security/cve/CVE-2024-31083.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222309
* https://bugzilla.suse.com/show_bug.cgi?id=1222310
* https://bugzilla.suse.com/show_bug.cgi?id=1222311
* https://bugzilla.suse.com/show_bug.cgi?id=1222312
* https://bugzilla.suse.com/show_bug.cgi?id=1222442
1
0
12 Apr '24
# Security update for xwayland
Announcement ID: SUSE-SU-2024:1265-1
Rating: important
References:
* bsc#1222309
* bsc#1222310
* bsc#1222312
* bsc#1222442
Cross-References:
* CVE-2024-31080
* CVE-2024-31081
* CVE-2024-31083
CVSS scores:
* CVE-2024-31080 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31081 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xwayland fixes the following issues:
* CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length
(bsc#1222309).
* CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to
send reply (bsc#1222310).
* CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs
(bsc#1222312).
Other fixes: \- Fixed regression for security fix for CVE-2024-31083 when using
Android Studio (bnc#1222442)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1265=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1265=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* xwayland-debugsource-21.1.4-150400.3.36.1
* xwayland-debuginfo-21.1.4-150400.3.36.1
* xwayland-devel-21.1.4-150400.3.36.1
* xwayland-21.1.4-150400.3.36.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* xwayland-debugsource-21.1.4-150400.3.36.1
* xwayland-debuginfo-21.1.4-150400.3.36.1
* xwayland-21.1.4-150400.3.36.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31080.html
* https://www.suse.com/security/cve/CVE-2024-31081.html
* https://www.suse.com/security/cve/CVE-2024-31083.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222309
* https://bugzilla.suse.com/show_bug.cgi?id=1222310
* https://bugzilla.suse.com/show_bug.cgi?id=1222312
* https://bugzilla.suse.com/show_bug.cgi?id=1222442
1
0
12 Apr '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:1270-1
Rating: important
References:
* bsc#1222010
Cross-References:
* CVE-2023-42843
* CVE-2023-42950
* CVE-2023-42956
* CVE-2024-23252
* CVE-2024-23254
* CVE-2024-23263
* CVE-2024-23280
* CVE-2024-23284
CVSS scores:
* CVE-2023-42843 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2023-42950 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-42950 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-42956 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-42956 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-23252 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-23254 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2024-23263 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-23280 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-23284 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
* CVE-2024-23252: Fixed denial of service via crafted web content
(bsc#1222010).
* CVE-2024-23254: Fixed possible audio data exilftration cross-origin via
malicious website (bsc#1222010).
* CVE-2024-23263: Fixed lack of Content Security Policy enforcing via
malicious crafted web content (bsc#1222010).
* CVE-2024-23280: Fixed possible user fingeprint via malicious crafted web
content (bsc#1222010).
* CVE-2024-23284: Fixed lack of Content Security Policy enforcing via
malicious crafted web content (bsc#1222010).
* CVE-2023-42950: Fixed arbitrary code execution via crafted web content
(bsc#1222010).
* CVE-2023-42956: Fixed denial of service via crafted web content
(bsc#1222010).
* CVE-2023-42843: Fixed address bar spoofing via malicious website
(bsc#1222010).
Other fixes:
* Update to version 2.44.0 (bsc#1222010):
* Make the DOM accessibility tree reachable from UI process with
GTK4.
* Removed the X11 and WPE renderers in favor of DMA-BUF.
* Improved vblank synchronization when rendering.
* Removed key event reinjection in GTK4 to make keyboard
shortcuts work in web sites.
* Fix gamepads detection by correctly handling focused window in
GTK4.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1270=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1270=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1270=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1270=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1270=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1270=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1270=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1270=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1270=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1270=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1270=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1270=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1270=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkit-jsc-4.1-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk4-minibrowser-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit-jsc-6.0-2.44.0-150400.4.78.1
* webkit2gtk4-devel-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk4-minibrowser-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* webkit-jsc-4-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-6_0-2.44.0-150400.4.78.1
* webkit-jsc-6.0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* typelib-1_0-WebKit-6_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-minibrowser-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* webkit-jsc-4.1-debuginfo-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-minibrowser-2.44.0-150400.4.78.1
* webkit-jsc-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-minibrowser-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* openSUSE Leap 15.4 (x86_64)
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-32bit-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-32bit-2.44.0-150400.4.78.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-64bit-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-64bit-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-64bit-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-64bit-2.44.0-150400.4.78.1
* openSUSE Leap 15.5 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* webkit-jsc-4.1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk4-minibrowser-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit-jsc-6.0-2.44.0-150400.4.78.1
* webkit2gtk4-devel-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk4-minibrowser-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* webkit-jsc-4-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-6_0-2.44.0-150400.4.78.1
* webkit-jsc-6.0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit-6_0-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-minibrowser-debuginfo-2.44.0-150400.4.78.1
* webkit-jsc-4.1-debuginfo-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-minibrowser-2.44.0-150400.4.78.1
* webkit-jsc-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-minibrowser-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* openSUSE Leap 15.5 (x86_64)
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-32bit-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-32bit-2.44.0-150400.4.78.1
* Basesystem Module 15-SP5 (noarch)
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* Desktop Applications Module 15-SP5 (noarch)
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* Development Tools Module 15-SP5 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.1-lang-2.44.0-150400.4.78.1
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* webkit2gtk4-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1
* libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1
* webkit2gtk3-debugsource-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1
* webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1
* libwebkitgtk-6_0-4-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1
* webkit2gtk3-devel-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Manager Proxy 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Manager Proxy 4.3 (x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
* SUSE Manager Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.0-150400.4.78.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1
* typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-150400.4.78.1
* typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1
* webkit2gtk3-soup2-debugsource-2.44.0-150400.4.78.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-150400.4.78.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-150400.4.78.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42843.html
* https://www.suse.com/security/cve/CVE-2023-42950.html
* https://www.suse.com/security/cve/CVE-2023-42956.html
* https://www.suse.com/security/cve/CVE-2024-23252.html
* https://www.suse.com/security/cve/CVE-2024-23254.html
* https://www.suse.com/security/cve/CVE-2024-23263.html
* https://www.suse.com/security/cve/CVE-2024-23280.html
* https://www.suse.com/security/cve/CVE-2024-23284.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222010
1
0
SUSE-SU-2024:1273-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5)
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1273-1
Rating: important
References:
* bsc#1219296
Cross-References:
* CVE-2023-52340
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_35 fixes one issue.
The following security issue was fixed:
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1273=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1273=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_35-rt-2-150500.11.8.1
* kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-2-150500.11.8.1
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_35-rt-2-150500.11.8.1
* kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-2-150500.11.8.1
* kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-2-150500.11.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1274-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1274-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_31 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1274=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1274=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_6-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-6-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_6-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_31-default-6-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1256-1: moderate: Security update for perl-Net-CIDR-Lite
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for perl-Net-CIDR-Lite
Announcement ID: SUSE-SU-2024:1256-1
Rating: moderate
References:
* bsc#1221564
Cross-References:
* CVE-2021-47154
CVSS scores:
* CVE-2021-47154 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for perl-Net-CIDR-Lite fixes the following issues:
* CVE-2021-47154: Fixed leading zeroes in IPv4 octets may allow attackers to
bypass certain access controls (bsc#1221564).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1256=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1256=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* perl-Net-CIDR-Lite-0.21-150100.6.3.1
* Development Tools Module 15-SP5 (noarch)
* perl-Net-CIDR-Lite-0.21-150100.6.3.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47154.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221564
1
0
12 Apr '24
# Recommended update for gcc13
Announcement ID: SUSE-RU-2024:1253-1
Rating: moderate
References:
* bsc#1210959
* bsc#1214934
* bsc#1217450
* bsc#1217667
* bsc#1218492
* bsc#1219031
* bsc#1219520
* bsc#1220724
* bsc#1221239
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that has nine fixes can now be installed.
## Description:
This update for gcc13 fixes the following issues:
* Fix unwinding for JIT code. [bsc#1221239]
* Revert libgccjit dependency change. [bsc#1220724]
* Remove crypt and crypt_r interceptors. The crypt API change in SLE15 SP3
breaks them. [bsc#1219520]
* Add support for -fmin-function-alignment. [bsc#1214934]
* Use %{_target_cpu} to determine host and build.
* Fix for building TVM. [bsc#1218492]
* Add cross-X-newlib-devel requires to newlib cross compilers. [bsc#1219031]
* Package m2rte.so plugin in the gcc13-m2 sub-package rather than in
gcc13-devel. [bsc#1210959]
* Require libstdc++6-devel-gcc13 from gcc13-m2 as m2 programs are linked
against libstdc++6.
* Fixed building mariadb on i686. [bsc#1217667]
* Avoid update-alternatives dependency for accelerator crosses.
* Package tool links to llvm in cross-amdgcn-gcc13 rather than in cross-
amdgcn-newlib13-devel since that also has the dependence.
* Depend on llvmVER instead of llvm with VER equal to %product_libs_llvm_ver
where available and adjust tool discovery accordingly. This should also
properly trigger re-builds when the patchlevel version of llvmVER changes,
possibly changing the binary names we link to. [bsc#1217450]
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1253=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1253=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1253=1
* SUSE Linux Enterprise Server 15 SP2
zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-1253=1
* SUSE Linux Enterprise Server 15 SP3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-1253=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1253=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1253=1 SUSE-SLE-
INSTALLER-15-SP4-2024-1253=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1253=1 SUSE-SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1253=1 SUSE-
SLE-INSTALLER-15-SP4-2024-1253=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1253=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1253=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1253=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1253=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1253=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1253=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1253=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1253=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1253=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1253=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1253=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1253=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1253=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1253=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1253=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1253=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1253=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1253=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1253=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1253=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1253=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1253=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1253=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1253=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1253=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1253=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64)
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64)
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2pim18-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-ada-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libada13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-m2-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libm2cor18-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-obj-c++-13.2.1+git8285-150000.1.9.1
* gcc13-go-13.2.1+git8285-150000.1.9.1
* libm2min18-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-obj-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2iso18-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libm2iso18-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-m2-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2log18-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libgo22-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-ada-13.2.1+git8285-150000.1.9.1
* libm2pim18-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2min18-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2log18-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-objc-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* gcc13-objc-13.2.1+git8285-150000.1.9.1
* libada13-13.2.1+git8285-150000.1.9.1
* libgo22-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libm2cor18-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* gcc13-go-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (x86_64)
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (s390x x86_64)
* gcc13-obj-c++-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libm2min18-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-m2-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-d-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-go-32bit-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgo22-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libm2iso18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2log18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libada13-32bit-13.2.1+git8285-150000.1.9.1
* libm2cor18-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libm2log18-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libada13-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgphobos4-32bit-13.2.1+git8285-150000.1.9.1
* libgphobos4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* libm2pim18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgo22-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libm2cor18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2pim18-32bit-13.2.1+git8285-150000.1.9.1
* libgdruntime4-32bit-13.2.1+git8285-150000.1.9.1
* libm2min18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2iso18-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libgdruntime4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-objc-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-ada-32bit-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (aarch64 s390x x86_64)
* libgdruntime4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-d-13.2.1+git8285-150000.1.9.1
* libgphobos4-debuginfo-13.2.1+git8285-150000.1.9.1
* libgdruntime4-13.2.1+git8285-150000.1.9.1
* libgphobos4-13.2.1+git8285-150000.1.9.1
* gcc13-d-debuginfo-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* openSUSE Leap 15.5 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* SUSE Manager Server 4.3 (x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libatomic1-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libatomic1-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libatomic1-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libatomic1-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libatomic1-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* Basesystem Module 15-SP5 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* Basesystem Module 15-SP5 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* Development Tools Module 15-SP5 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* Development Tools Module 15-SP5 (x86_64)
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libm2pim18-13.2.1+git8285-150000.1.9.1
* gcc13-ada-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libada13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-m2-13.2.1+git8285-150000.1.9.1
* libm2cor18-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-obj-c++-13.2.1+git8285-150000.1.9.1
* gcc13-go-13.2.1+git8285-150000.1.9.1
* libm2min18-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-obj-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2iso18-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2iso18-13.2.1+git8285-150000.1.9.1
* gcc13-m2-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2log18-debuginfo-13.2.1+git8285-150000.1.9.1
* libgo22-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-ada-13.2.1+git8285-150000.1.9.1
* libm2pim18-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2min18-13.2.1+git8285-150000.1.9.1
* libm2log18-13.2.1+git8285-150000.1.9.1
* gcc13-objc-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-objc-13.2.1+git8285-150000.1.9.1
* libada13-13.2.1+git8285-150000.1.9.1
* libgo22-13.2.1+git8285-150000.1.9.1
* libm2cor18-13.2.1+git8285-150000.1.9.1
* gcc13-go-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* libgdruntime4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-d-13.2.1+git8285-150000.1.9.1
* libgphobos4-debuginfo-13.2.1+git8285-150000.1.9.1
* libgdruntime4-13.2.1+git8285-150000.1.9.1
* libgphobos4-13.2.1+git8285-150000.1.9.1
* gcc13-d-debuginfo-13.2.1+git8285-150000.1.9.1
* SUSE Package Hub 15 15-SP5 (x86_64)
* gcc13-obj-c++-32bit-13.2.1+git8285-150000.1.9.1
* libm2min18-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-m2-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-d-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-go-32bit-13.2.1+git8285-150000.1.9.1
* libgo22-32bit-13.2.1+git8285-150000.1.9.1
* libm2iso18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2log18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libada13-32bit-13.2.1+git8285-150000.1.9.1
* libm2cor18-32bit-13.2.1+git8285-150000.1.9.1
* libm2log18-32bit-13.2.1+git8285-150000.1.9.1
* libada13-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgphobos4-32bit-13.2.1+git8285-150000.1.9.1
* libgphobos4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2pim18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgo22-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2cor18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2pim18-32bit-13.2.1+git8285-150000.1.9.1
* libgdruntime4-32bit-13.2.1+git8285-150000.1.9.1
* libm2min18-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libm2iso18-32bit-13.2.1+git8285-150000.1.9.1
* libgdruntime4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-objc-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-ada-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (s390x x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le x86_64)
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libobjc4-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* libhwasan0-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-13.2.1+git8285-150000.1.9.1
* libubsan1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-locale-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-13.2.1+git8285-150000.1.9.1
* libasan8-13.2.1+git8285-150000.1.9.1
* libgfortran5-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* libitm1-debuginfo-13.2.1+git8285-150000.1.9.1
* libobjc4-13.2.1+git8285-150000.1.9.1
* libtsan2-13.2.1+git8285-150000.1.9.1
* libasan8-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-debuginfo-13.2.1+git8285-150000.1.9.1
* libitm1-13.2.1+git8285-150000.1.9.1
* liblsan0-13.2.1+git8285-150000.1.9.1
* libubsan1-13.2.1+git8285-150000.1.9.1
* liblsan0-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libtsan2-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-13.2.1+git8285-150000.1.9.1
* libhwasan0-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgomp1-13.2.1+git8285-150000.1.9.1
* SUSE Enterprise Storage 7.1 (x86_64)
* gcc13-fortran-debuginfo-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-locale-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debugsource-13.2.1+git8285-150000.1.9.1
* gcc13-c++-32bit-13.2.1+git8285-150000.1.9.1
* libobjc4-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-13.2.1+git8285-150000.1.9.1
* libgfortran5-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-debuginfo-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-debuginfo-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-13.2.1+git8285-150000.1.9.1
* libgcc_s1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-13.2.1+git8285-150000.1.9.1
* libstdc++6-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-debuginfo-13.2.1+git8285-150000.1.9.1
* libquadmath0-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-32bit-13.2.1+git8285-150000.1.9.1
* cpp13-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-fortran-32bit-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-13.2.1+git8285-150000.1.9.1
* gcc13-PIE-13.2.1+git8285-150000.1.9.1
* cpp13-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-13.2.1+git8285-150000.1.9.1
* gcc13-32bit-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-devel-gcc13-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-13.2.1+git8285-150000.1.9.1
* libstdc++6-pp-32bit-13.2.1+git8285-150000.1.9.1
* libquadmath0-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* gcc13-c++-13.2.1+git8285-150000.1.9.1
* cross-nvptx-newlib13-devel-13.2.1+git8285-150000.1.9.1
* libasan8-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libgomp1-32bit-13.2.1+git8285-150000.1.9.1
* libitm1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* cross-nvptx-gcc13-13.2.1+git8285-150000.1.9.1
* libubsan1-32bit-debuginfo-13.2.1+git8285-150000.1.9.1
* libatomic1-32bit-13.2.1+git8285-150000.1.9.1
* SUSE Enterprise Storage 7.1 (noarch)
* gcc13-info-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libgcc_s1-13.2.1+git8285-150000.1.9.1
* libgcc_s1-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-debuginfo-13.2.1+git8285-150000.1.9.1
* libstdc++6-13.2.1+git8285-150000.1.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1210959
* https://bugzilla.suse.com/show_bug.cgi?id=1214934
* https://bugzilla.suse.com/show_bug.cgi?id=1217450
* https://bugzilla.suse.com/show_bug.cgi?id=1217667
* https://bugzilla.suse.com/show_bug.cgi?id=1218492
* https://bugzilla.suse.com/show_bug.cgi?id=1219031
* https://bugzilla.suse.com/show_bug.cgi?id=1219520
* https://bugzilla.suse.com/show_bug.cgi?id=1220724
* https://bugzilla.suse.com/show_bug.cgi?id=1221239
1
0
SUSE-SU-2024:1252-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)
by OPENSUSE-UPDATES 12 Apr '24
by OPENSUSE-UPDATES 12 Apr '24
12 Apr '24
# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1252-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_7 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1252=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1252=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_7-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_1-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-9-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_7-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_1-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-9-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1248-1: important: Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1248-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_138 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1248=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1248=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_138-default-7-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_37-debugsource-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_138-default-debuginfo-7-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_138-preempt-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_138-preempt-debuginfo-7-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_138-default-7-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1249-1: important: Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1249-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_130 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1249=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1250=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1250=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP2_Update_35-debugsource-12-150200.2.1
* kernel-livepatch-5_3_18-150200_24_148-default-12-150200.2.1
* kernel-livepatch-5_3_18-150200_24_148-default-debuginfo-12-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_130-default-8-150300.2.1
* kernel-livepatch-5_3_18-150300_59_130-default-debuginfo-8-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_35-debugsource-8-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_130-preempt-debuginfo-8-150300.2.1
* kernel-livepatch-5_3_18-150300_59_130-preempt-8-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_130-default-8-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1251-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1251-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_28 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1251=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1251=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_28-default-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_5-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-7-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_28-default-7-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_5-debugsource-7-150500.2.1
* kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-7-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1207-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1207-1
Rating: important
References:
* bsc#1219296
Cross-References:
* CVE-2023-52340
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_150 fixes one issue.
The following security issue was fixed:
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-1219=1 SUSE-SLE-Live-
Patching-12-SP5-2024-1207=1 SUSE-SLE-Live-Patching-12-SP5-2024-1208=1 SUSE-SLE-
Live-Patching-12-SP5-2024-1209=1 SUSE-SLE-Live-Patching-12-SP5-2024-1210=1 SUSE-
SLE-Live-Patching-12-SP5-2024-1211=1 SUSE-SLE-Live-Patching-12-SP5-2024-1212=1
SUSE-SLE-Live-Patching-12-SP5-2024-1213=1 SUSE-SLE-Live-
Patching-12-SP5-2024-1214=1 SUSE-SLE-Live-Patching-12-SP5-2024-1215=1 SUSE-SLE-
Live-Patching-12-SP5-2024-1216=1 SUSE-SLE-Live-Patching-12-SP5-2024-1217=1 SUSE-
SLE-Live-Patching-12-SP5-2024-1218=1
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1227=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1247=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1247=1
## Package List:
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kgraft-patch-4_12_14-122_165-default-9-2.1
* kgraft-patch-4_12_14-122_179-default-6-2.1
* kgraft-patch-4_12_14-122_150-default-14-2.2
* kgraft-patch-4_12_14-122_153-default-12-2.1
* kgraft-patch-4_12_14-122_176-default-7-2.1
* kgraft-patch-4_12_14-122_173-default-8-2.1
* kgraft-patch-4_12_14-122_194-default-3-2.1
* kgraft-patch-4_12_14-122_189-default-4-2.1
* kgraft-patch-4_12_14-122_183-default-6-2.1
* kgraft-patch-4_12_14-122_186-default-5-2.1
* kgraft-patch-4_12_14-122_162-default-10-2.1
* kgraft-patch-4_12_14-122_156-default-12-2.1
* kgraft-patch-4_12_14-122_159-default-11-2.1
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP2_Update_45-debugsource-4-150200.2.1
* kernel-livepatch-5_3_18-150200_24_178-default-4-150200.2.1
* kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-4-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_150-default-4-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-4-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_41-debugsource-4-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_150-preempt-4-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-4-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_150-default-4-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1246-1: important: Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1246-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_133 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1246=1 SUSE-SLE-
Module-Live-Patching-15-SP2-2024-1220=1 SUSE-SLE-Module-Live-
Patching-15-SP2-2024-1221=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-1222=1
SUSE-SLE-Module-Live-Patching-15-SP2-2024-1223=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1230=1 SUSE-2024-1237=1 SUSE-2024-1242=1
SUSE-2024-1232=1 SUSE-2024-1233=1 SUSE-2024-1234=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1230=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2024-1237=1 SUSE-SLE-Module-Live-
Patching-15-SP3-2024-1242=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-1232=1
SUSE-SLE-Module-Live-Patching-15-SP3-2024-1233=1 SUSE-SLE-Module-Live-
Patching-15-SP3-2024-1234=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150200_24_154-default-10-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_34-debugsource-13-150200.2.1
* kernel-livepatch-5_3_18-150200_24_160-default-8-150200.2.1
* kernel-livepatch-5_3_18-150200_24_151-default-debuginfo-12-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_38-debugsource-9-150200.2.1
* kernel-livepatch-5_3_18-150200_24_157-default-debuginfo-9-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_39-debugsource-8-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_36-debugsource-12-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_37-debugsource-10-150200.2.1
* kernel-livepatch-5_3_18-150200_24_157-default-9-150200.2.1
* kernel-livepatch-5_3_18-150200_24_151-default-12-150200.2.1
* kernel-livepatch-5_3_18-150200_24_145-default-13-150200.2.1
* kernel-livepatch-5_3_18-150200_24_160-default-debuginfo-8-150200.2.1
* kernel-livepatch-5_3_18-150200_24_154-default-debuginfo-10-150200.2.1
* kernel-livepatch-5_3_18-150200_24_145-default-debuginfo-13-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_118-default-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_115-default-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_133-default-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_127-default-9-150300.2.1
* kernel-livepatch-5_3_18-150300_59_118-default-debuginfo-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_121-default-debuginfo-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_127-default-debuginfo-9-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_36-debugsource-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_124-default-debuginfo-10-150300.2.1
* kernel-livepatch-5_3_18-150300_59_124-default-10-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_33-debugsource-10-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_34-debugsource-9-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_32-debugsource-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_121-default-12-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_31-debugsource-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_133-default-debuginfo-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_115-default-13-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_30-debugsource-13-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_127-preempt-9-150300.2.1
* kernel-livepatch-5_3_18-150300_59_118-preempt-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_124-preempt-10-150300.2.1
* kernel-livepatch-5_3_18-150300_59_133-preempt-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_121-preempt-debuginfo-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_121-preempt-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_115-preempt-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_118-preempt-debuginfo-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_127-preempt-debuginfo-9-150300.2.1
* kernel-livepatch-5_3_18-150300_59_133-preempt-debuginfo-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_124-preempt-debuginfo-10-150300.2.1
* kernel-livepatch-5_3_18-150300_59_115-preempt-13-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_118-default-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_133-default-7-150300.2.1
* kernel-livepatch-5_3_18-150300_59_127-default-9-150300.2.1
* kernel-livepatch-5_3_18-150300_59_124-default-10-150300.2.1
* kernel-livepatch-5_3_18-150300_59_121-default-12-150300.2.1
* kernel-livepatch-5_3_18-150300_59_115-default-13-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1229-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:1229-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_147 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1226=1 SUSE-SLE-
Module-Live-Patching-15-SP2-2024-1229=1 SUSE-SLE-Module-Live-
Patching-15-SP2-2024-1224=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-1225=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1243=1 SUSE-2024-1244=1 SUSE-2024-1235=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1243=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2024-1244=1 SUSE-SLE-Module-Live-
Patching-15-SP3-2024-1235=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150200_24_175-default-5-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_43-debugsource-5-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-6-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-6-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_44-debugsource-5-150200.2.1
* kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-5-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_42-debugsource-6-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_41-debugsource-7-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-5-150200.2.1
* kernel-livepatch-5_3_18-150200_24_166-default-7-150200.2.1
* kernel-livepatch-5_3_18-150200_24_166-default-debuginfo-7-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-5-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-5-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_40-debugsource-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-6-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_38-debugsource-6-150300.2.1
* kernel-livepatch-5_3_18-150300_59_144-default-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_141-default-6-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-5-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_39-debugsource-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-5-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_141-preempt-6-150300.2.1
* kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-6-150300.2.1
* kernel-livepatch-5_3_18-150300_59_144-preempt-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-5-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_144-default-5-150300.2.1
* kernel-livepatch-5_3_18-150300_59_141-default-6-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-5-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
1
0
SUSE-SU-2024:1236-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1236-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_19 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1236=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1245=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2024-1238=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1245=1 SUSE-2024-1238=1 SUSE-2024-1236=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_12-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_3-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_53-default-10-150500.9.2
* kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_2-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_53-default-debuginfo-10-150500.9.2
* kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-8-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_0-debugsource-10-150500.9.2
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_12-default-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_3-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_53-default-10-150500.9.2
* kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-9-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_2-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_53-default-debuginfo-10-150500.9.2
* kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_55_19-default-8-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_0-debugsource-10-150500.9.2
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1239-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1239-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_44 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1241=1 SUSE-2024-1239=1 SUSE-2024-1240=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1240=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1241=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2024-1239=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-4-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-4-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-4-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-5-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-4-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-4-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-4-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-5-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-5-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-RU-2024:1201-1: low: Recommended update for xfsprogs-scrub and jctools
by OPENSUSE-UPDATES 11 Apr '24
by OPENSUSE-UPDATES 11 Apr '24
11 Apr '24
# Recommended update for xfsprogs-scrub and jctools
Announcement ID: SUSE-RU-2024:1201-1
Rating: low
References:
* bsc#1190495
* bsc#1213418
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that has two fixes can now be installed.
## Description:
This update for xfsprogs-scrub fixes the following issues:
* Added missing xfsprogs-scrub to Package Hub for SLE-15-SP5 (bsc#1190495)
* Added missing jctools to Package Hub for SLE-15-SP5 (bsc#1213418)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1201=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1201=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1201=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1201=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1201=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1201=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1201=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1201=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1201=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1201=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1201=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-devel-5.13.0-150400.3.7.1
* libhandle1-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* libhandle1-debuginfo-5.13.0-150400.3.7.1
* SUSE Package Hub 15 15-SP5 (noarch)
* jctools-3.3.0-150200.3.6.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* xfsprogs-scrub-5.13.0-150400.3.7.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-devel-5.13.0-150400.3.7.1
* libhandle1-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* libhandle1-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-scrub-5.13.0-150400.3.7.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* openSUSE Leap 15.5 (noarch)
* jctools-experimental-3.3.0-150200.3.6.1
* jctools-channels-3.3.0-150200.3.6.1
* jctools-javadoc-3.3.0-150200.3.6.1
* jctools-3.3.0-150200.3.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-devel-5.13.0-150400.3.7.1
* libhandle1-5.13.0-150400.3.7.1
* xfsprogs-5.13.0-150400.3.7.1
* xfsprogs-debugsource-5.13.0-150400.3.7.1
* libhandle1-debuginfo-5.13.0-150400.3.7.1
* xfsprogs-scrub-5.13.0-150400.3.7.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1190495
* https://bugzilla.suse.com/show_bug.cgi?id=1213418
1
0
11 Apr '24
# Security update for tomcat10
Announcement ID: SUSE-SU-2024:1204-1
Rating: important
References:
* bsc#1221385
* bsc#1221386
Cross-References:
* CVE-2024-23672
* CVE-2024-24549
CVSS scores:
* CVE-2024-23672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24549 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for tomcat10 fixes the following issues:
* CVE-2024-24549: Fixed denial of service during header validation for HTTP/2
stream (bsc#1221386)
* CVE-2024-23672: Fixed denial of service due to malicious WebSocket client
keeping connection open (bsc#1221385)
Other fixes: \- Update to Tomcat 10.1.20 * Catalina \+ Fix: Minor performance
improvement for building filter chains. Based on ideas from #702 by Luke Miao.
(remm) \+ Fix: Align error handling for Writer and OutputStream. Ensure use of
either once the response has been recycled triggers a NullPointerException
provided that discardFacades is configured with the default value of true.
(markt) \+ Fix: 68692: The standard thread pool implementations that are
configured using the Executor element now implement ExecutorService for better
support NIO2. (remm) \+ Fix: 68495: When restoring a saved POST request after a
successful FORM authentication, ensure that neither the URI, the query string
nor the protocol are corrupted when restoring the request body. (markt) \+ Fix:
After forwarding a request, attempt to unwrap the response in order to suspend
it, instead of simply closing it if it was wrapped. Add a new
suspendWrappedResponseAfterForward boolean attribute on Context to control the
bahavior, defaulting to false. (remm) \+ Fix: 68721: Workaround a possible cause
of duplicate class definitions when using ClassFileTransformers and the
transformation of a class also triggers the loading of the same class. (markt)
\+ Fix: The rewrite valve should not do a rewrite if the output is identical to
the input. (remm) \+ Update: Add a new valveSkip (or VS) rule flag to the
rewrite valve to allow skipping over the next valve in the Catalina pipeline.
(remm) \+ Update: Add highConcurrencyStatus attribute to the SemaphoreValve to
optionally allow the valve to return an error status code to the client when a
permit cannot be acquired from the semaphore. (remm) \+ Add: Add checking of the
"age" of the running Tomcat instance since its build-date to the
SecurityListener, and log a warning if the server is old. (schultz) \+ Fix: When
using the AsyncContext, throw an IllegalStateException, rather than allowing an
NullPointerException, if an attempt is made to use the AsyncContext after it has
been recycled. (markt) \+ Fix: Correct JPMS and OSGi meta-data for tomcat-embed-
core.jar by removing reference to org.apache.catalina.ssi package that is no
longer included in the JAR. Based on pull request #684 by Jendrik Johannes.
(markt) \+ Fix: Fix ServiceBindingPropertySource so that trailing \r\n sequences
are correctly removed from files containing property values when configured to
do so. Bug identified by Coverity Scan. (markt) \+ Add: Add improvements to the
CSRF prevention filter including the ability to skip adding nonces for resource
name and subtree URL patterns. (schultz) \+ Fix: Review usage of debug logging
and downgrade trace or data dumping operations from debug level to trace. (remm)
\+ Fix: 68089: Further improve the performance of request attribute access for
ApplicationHttpRequest and ApplicationRequest. (markt) \+ Fix: 68559: Allow
asynchronous error handling to write to the response after an error during
asynchronous processing. (markt) * Coyote \+ Fix: Improve the HTTP/2 stream
prioritisation process. If a stream uses all of the connection windows and still
has content to write, it will now be added to the backlog immediately rather
than waiting until the write attempt for the remaining content. (markt) \+ Fix:
Add threadsMaxIdleTime attribute to the endpoint, to allow configuring the
amount of time before an internal executor will scale back to the configured
minSpareThreads size. (remm) \+ Fix: Correct a regression in the support for
user provided SSLContext instances that broke the
org.apache.catalina.security.TLSCertificateReloadListener. (markt) \+ Fix:
Setting a null value for a cookie attribute should remove the attribute. (markt)
\+ Fix: Make asynchronous error handling more robust. Ensure that once a
connection is marked to be closed, further asynchronous processing cannot change
that. (markt) \+ Fix: Make asynchronous error handling more robust. Ensure that
once the call to AsyncListener.onError() has returned to the container, only
container threads can access the AsyncContext. This protects against various
race conditions that woudl otherwise occur if application threads continued to
access the AsyncContext. \+ Fix: Review usage of debug logging and downgrade
trace or data dumping operations from debug level to trace. In particular, most
of the HTTP/2 debug logging has been changed to trace level. (remm) \+ Fix: Add
support for user provided SSLContext instances configured on
SSLHostConfigCertificate instances. Based on pull request #673 provided by Hakan
Altındağ. (markt) \+ Fix: Partial fix for 68558: Cache the result of converting
to String for request URI, HTTP header names and the request Content-Type value
to improve performance by reducing repeated byte[] to String conversions.
(markt) \+ Fix: Improve error reporting to HTTP/2 clients for header processing
errors by reporting problems at the end of the frame where the error was
detected rather than at the end of the headers. (markt) \+ Fix: Remove the
remaining reference to a stream once the stream has been recycled. This makes
the stream eligible for garbage collection earlier and thereby improves
scalability. (markt) * Jasper \+ Add: Add support for specifying Java 22 (with
the value 22) as the compiler source and/or compiler target for JSP compilation.
If used with an Eclipse JDT compiler version that does not support these values,
a warning will be logged and the default will used. (markt) \+ Fix: Handle the
case where the JSP engine forwards a request/response to a Servlet that uses an
OutputStream rather than a Writer. This was triggering an IllegalStateException
on code paths where there was a subsequent attempt to obtain a Writer. (markt)
\+ Fix: Correctly handle the case where a tag library is packaged in a JAR file
and the web application is deployed as a WAR file rather than an unpacked
directory. (markt) \+ Fix: 68546: Generate optimal size and types for JSP
imports maps, as suggested by John Engebretson. (remm) \+ Fix: Review usage of
debug logging and downgrade trace or data dumping operations from debug level to
trace. (remm) * Cluster \+ Fix: Avoid updating request count stats on async.
(remm) * WebSocket \+ Fix: Correct a regression in the fix for 66508 that could
cause an UpgradeProcessor leak in some circumstances. (markt) \+ Fix: Review
usage of debug logging and downgrade trace or data dumping operations from debug
level to trace. (remm) \+ Fix: Ensure that WebSocket connection closure
completes if the connection is closed when the server side has used the
proprietary suspend/resume feature to suspend the connection. (markt) * Web
applications Add: Add support for responses in JSON format from the examples
application RequestHeaderExample. (schultz) * Other \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt) \+ Fix: 57130: Allow digest.(sh|bat) to accept password from a
file or stdin. (csutherl/schultz) \+ Update: Update Checkstyle to 10.14.1.
(markt) \+ Fix: Correct the remaining OSGi contract references in the manifest
files to refer to the Jakarta EE contract names rather than the Java EE contract
names. Based on pull request #685 provided by Paul A. Nicolucci. (markt) \+
Update: Update Checkstyle to 10.13.0. (markt) \+ Update: Update JSign to 6.0.
(markt) \+ Update: Update the packaged version of the Tomcat Migration Tool for
Jakarta EE to 1.0.7. (markt) \+ Update: Update Tomcat Native to 2.0.7. (markt)
\+ Update: Add strings for debug level messages. (remm) \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1204=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1204=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-embed-10.1.20-150200.5.22.2
* tomcat10-jsvc-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2
* tomcat10-docs-webapp-10.1.20-150200.5.22.2
* Web and Scripting Module 15-SP5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2
## References:
* https://www.suse.com/security/cve/CVE-2024-23672.html
* https://www.suse.com/security/cve/CVE-2024-24549.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221385
* https://bugzilla.suse.com/show_bug.cgi?id=1221386
1
0
# Recommended update for rpm
Announcement ID: SUSE-RU-2024:1206-1
Rating: moderate
References:
* bsc#1222259
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.4
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
An update that has one fix can now be installed.
## Description:
This update for rpm fixes the following issues:
* remove imaevmsign plugin from rpm-ndb [bsc#1222259]
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1206=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1206=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1206=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1206=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1206=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1206=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1206=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1206=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1206=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1206=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1206=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1206=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1206=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1206=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1206=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1206=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1206=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1206=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1206=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1206=1
* SUSE Manager Proxy 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1206=1
## Package List:
* SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* SUSE Manager Proxy 4.3 (x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-4.14.3-150400.59.13.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-4.14.3-150400.59.13.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* SUSE Manager Server 4.3 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-imaevmsign-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* rpm-imaevmsign-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* openSUSE Leap 15.4 (x86_64)
* rpm-ndb-32bit-4.14.3-150400.59.13.1
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-ndb-32bit-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* rpm-ndb-64bit-debuginfo-4.14.3-150400.59.13.1
* rpm-64bit-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-64bit-4.14.3-150400.59.13.1
* rpm-64bit-4.14.3-150400.59.13.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* openSUSE Leap 15.5 (x86_64)
* rpm-ndb-32bit-4.14.3-150400.59.13.1
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-ndb-32bit-debuginfo-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-rpm-4.14.3-150400.59.13.1
* rpm-debugsource-4.14.3-150400.59.13.1
* python3-rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-devel-4.14.3-150400.59.13.1
* python-rpm-debugsource-4.14.3-150400.59.13.1
* rpm-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* Basesystem Module 15-SP5 (x86_64)
* rpm-32bit-4.14.3-150400.59.13.1
* rpm-32bit-debuginfo-4.14.3-150400.59.13.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rpm-ndb-debugsource-4.14.3-150400.59.13.1
* rpm-ndb-4.14.3-150400.59.13.1
* rpm-ndb-debuginfo-4.14.3-150400.59.13.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-rpm-debuginfo-4.14.3-150400.59.13.1
* python311-rpm-4.14.3-150400.59.13.1
* SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
* rpm-debugsource-4.14.3-150400.59.13.1
* rpm-debuginfo-4.14.3-150400.59.13.1
* rpm-build-debuginfo-4.14.3-150400.59.13.1
* rpm-build-4.14.3-150400.59.13.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222259
1
0
11 Apr '24
# Recommended update for fftw3
Announcement ID: SUSE-RU-2024:1200-1
Rating: moderate
References:
* bsc#1220815
Affected Products:
* Basesystem Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for fftw3 fixes the following issues:
* Don't install half-baked cmake files (bsc#1220815): the files are incomplete
and useless with the build using auto-tools
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1200=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1200=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1200=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-1200=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1200=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfftw3_3_3_9-gnu-openmpi3-hpc-3.3.9-150300.3.3.1
* libfftw3_omp3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-3.3.9-150300.3.3.1
* libfftw3-gnu-mpich-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi4-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi4-hpc-devel-3.3.9-150300.3.3.1
* fftw3-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3-gnu-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3_omp3-3.3.9-150300.3.3.1
* fftw3-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-debugsource-3.3.9-150300.3.3.1
* libfftw3-gnu-mvapich2-hpc-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-static-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi2-hpc-3.3.9-150300.3.3.1
* fftw3-gnu-mpich-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-static-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi4-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mvapich2-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3-openmp-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-3.3.9-150300.3.3.1
* libfftw3-3-3.3.9-150300.3.3.1
* libfftw3_threads3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mvapich2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi3-hpc-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi3-hpc-devel-3.3.9-150300.3.3.1
* fftw3-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi3-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-mvapich2-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mpich-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi2-hpc-devel-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi4-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mpich-hpc-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi2-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-threads-devel-3.3.9-150300.3.3.1
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586)
* libfftw3_mpi3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_mpi3-3.3.9-150300.3.3.1
* fftw3-mpi-devel-3.3.9-150300.3.3.1
* openSUSE Leap 15.3 (x86_64)
* libfftw3_omp3-32bit-3.3.9-150300.3.3.1
* libfftw3_omp3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-32bit-3.3.9-150300.3.3.1
* libfftw3_mpi3-32bit-3.3.9-150300.3.3.1
* libfftw3-3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-32bit-3.3.9-150300.3.3.1
* libfftw3_mpi3-32bit-debuginfo-3.3.9-150300.3.3.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libfftw3-3-64bit-3.3.9-150300.3.3.1
* libfftw3_omp3-64bit-3.3.9-150300.3.3.1
* libfftw3_omp3-64bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-64bit-3.3.9-150300.3.3.1
* libfftw3_threads3-64bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_mpi3-64bit-3.3.9-150300.3.3.1
* libfftw3_mpi3-64bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-64bit-debuginfo-3.3.9-150300.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libfftw3_3_3_9-gnu-openmpi3-hpc-3.3.9-150300.3.3.1
* libfftw3_omp3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-static-3.3.9-150300.3.3.1
* libfftw3-gnu-mpich-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi4-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi4-hpc-devel-3.3.9-150300.3.3.1
* fftw3-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3-gnu-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3_omp3-3.3.9-150300.3.3.1
* fftw3-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-debugsource-3.3.9-150300.3.3.1
* libfftw3-gnu-mvapich2-hpc-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-devel-static-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi2-hpc-3.3.9-150300.3.3.1
* fftw3-gnu-mpich-hpc-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-static-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi4-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mvapich2-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mvapich2-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3-openmp-devel-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-devel-3.3.9-150300.3.3.1
* libfftw3-3-3.3.9-150300.3.3.1
* libfftw3_threads3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mvapich2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi3-hpc-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi3-hpc-devel-3.3.9-150300.3.3.1
* fftw3-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi3-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-static-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi4-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-mvapich2-hpc-devel-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mpich-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-openmpi2-hpc-debuginfo-3.3.9-150300.3.3.1
* fftw3-gnu-openmpi2-hpc-devel-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi4-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi3-hpc-debuginfo-3.3.9-150300.3.3.1
* libfftw3_3_3_9-gnu-mpich-hpc-3.3.9-150300.3.3.1
* libfftw3-gnu-openmpi2-hpc-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-openmpi2-hpc-debugsource-3.3.9-150300.3.3.1
* fftw3_3_3_9-gnu-mpich-hpc-devel-debuginfo-3.3.9-150300.3.3.1
* fftw3-threads-devel-3.3.9-150300.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* libfftw3_mpi3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_mpi3-3.3.9-150300.3.3.1
* fftw3-mpi-devel-3.3.9-150300.3.3.1
* openSUSE Leap 15.5 (x86_64)
* libfftw3_omp3-32bit-3.3.9-150300.3.3.1
* libfftw3_omp3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-32bit-3.3.9-150300.3.3.1
* libfftw3_mpi3-32bit-3.3.9-150300.3.3.1
* libfftw3-3-32bit-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-32bit-3.3.9-150300.3.3.1
* libfftw3_mpi3-32bit-debuginfo-3.3.9-150300.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfftw3-3-3.3.9-150300.3.3.1
* libfftw3_threads3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_threads3-3.3.9-150300.3.3.1
* fftw3-devel-debuginfo-3.3.9-150300.3.3.1
* libfftw3-3-debuginfo-3.3.9-150300.3.3.1
* fftw3-debugsource-3.3.9-150300.3.3.1
* fftw3-devel-3.3.9-150300.3.3.1
* Legacy Module 15-SP5 (aarch64 ppc64le x86_64)
* libfftw3_mpi3-debuginfo-3.3.9-150300.3.3.1
* fftw3-debugsource-3.3.9-150300.3.3.1
* libfftw3_mpi3-3.3.9-150300.3.3.1
* fftw3-mpi-devel-3.3.9-150300.3.3.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* fftw3-openmp-devel-3.3.9-150300.3.3.1
* libfftw3_omp3-debuginfo-3.3.9-150300.3.3.1
* libfftw3_omp3-3.3.9-150300.3.3.1
* fftw3-debugsource-3.3.9-150300.3.3.1
* fftw3-threads-devel-3.3.9-150300.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220815
1
0
openSUSE-SU-2024:0106-1: moderate: Security update for sngrep
by opensuse-security@opensuse.org 10 Apr '24
by opensuse-security@opensuse.org 10 Apr '24
10 Apr '24
openSUSE Security Update: Security update for sngrep
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0106-1
Rating: moderate
References:
Cross-References: CVE-2024-3119 CVE-2024-3120
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for sngrep fixes the following issues:
- Update to version 1.8.1
* Fix CVE-2024-3119: sngrep: buffer overflow due to improper handling of
'Call-ID' and 'X-Call-ID' SIP headers.
* Fix CVE-2024-3120: sngrep: stack-buffer overflow due to inadequate
bounds checking when copying 'Content-Length' and 'Warning' headers
into fixed-size buffers.
- Update to versino 1.8.0
* fix typo in message, thanks to lintian.
* fix compiler warnings about unused variables.
* Fixed a typo in comment line in filter.c
* Redefine usage of POSIX signals.
* Support for building sngrep using CMake added.
- Update to version 1.7.0
* save: add option --text to save captured data to plain text
* capture: fix memory overflows while parsing IP headers
* hep: fix hep listener enabled in offline mode
* core: stop sngrep when parent process has ended
* ssl: fix decrypt with AES256 GCM SHA384 cipher
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-106=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
sngrep-1.8.1-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-3119.html
https://www.suse.com/security/cve/CVE-2024-3120.html
1
0
openSUSE-RU-2024:0107-1: moderate: Recommended update for micro-editor
by maintenance@opensuse.org 10 Apr '24
by maintenance@opensuse.org 10 Apr '24
10 Apr '24
openSUSE Recommended Update: Recommended update for micro-editor
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0107-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for micro-editor fixes the following issues:
- Update to version 2.0.13:
* Add reload setting - finalization of #2627 (#2845)
* Handle SIGABRT properly
* Fix python decorator syntax. (#2827)
* Fixed newline format detection for files not ending with a newline
(#2875)
* Fix typos in README (#2919)
* fix: recognize .cmd as batch files (#2922)
* help: fix incorrect instructions for disabling key binding (#2943)
* Fix non-working lua Lock (#2945)
* save: Restore the screen before overwriteFile() is left (#2967)
* save: Restore the screen if failed to start sudo (#2971)
* syntax: Fix include of patch in git-commit (#2917)
* Improve metainfo file (#2910)
* Fix issues with handling invalid regex in syntax files (#2913)
* Fix term output capturing
* Docs for fakecursor option
- Update to version 2.0.12:
* Bump tcell for windows update
* Add onSetActive callback (#2885)
* Update micro.desktop (#2864)
* Fix for capturing internal terminal pty output
* actions: Fix the iteration over a slice under modification in
QuitAll() (#2898)
* highlighter: Fix regions and patterns inside regions (#2840)
* add new types for zig (#2861)
* Add support for Jenkinsfile syntax (#2750)
* Update copypaste.md (#2826)
* plugins.md: Add (on|pre)Rune documentation (#2837)
* Treat Containerfiles as Dockerfiles (#2846)
* Fixed a typo in keybindings.md (#2852)
* Resolve merge conflict with scrollbarchar
* Add 'scrollbarchar' option (#2342)
* Add HistorySearchUp and HistorySearchDown actions (#1829)
* chore: os.SEEK_CUR os.SEEK_END os.SEEK_SET has been deprecated since
Go 1.7 (#2856)
* Fix: Syntax highlighting for various issues (#2810)
* plugins: Add capability to dis-/enable them per buffer (#2836)
* save: fsync data safely to disk (#2681)
* Add config JSON schema (#2697)
* Filled µ with white for consistency (#2811)
* Goto next/previous diff commands + minor cleanups (#2759)
* fixed tex comment detection at start of line (#2764)
* Add type="desktop-application" into appdata component (#2803)
* Fix the appdata (#2796)
* Fix appdata file (#2793)
* Fix com.github.zyedidia.micro.metainfo.xml (#2792)
* Exit application if input terminal has closed
* Hare (harelang) syntax (#2776)
* Replace zyedidia/pty with upstream creack/pty
* Add statusline.inactive and statusline.suggestions color groups (#1832)
* refactor(runtime): simplify AssetDir() (#2761)
* Bump golang.org/x/text from 0.3.2 to 0.3.8 (#2757)
* Don't auto-detect commenttype if last_ft is empty
* Always return full RunBackgroundShell output
* Delete .gitmodules (#2743)
* Make the commenttype option useful (#2735)
* add `restrict` to C syntax (#2728)
* fix unsigned int not highlighted (#2725)
* Update readme build badge for github actions
* Convert ci to github actions
* util.HttpRequest helper to make requests with headers (#2678)
* Fix build
* Prompt on save/ existing file (#2714)
* Add -profile flag for CPU profiling (#2715)
* Reload settings when filetype is changed
* Add fakecursor option
* Rename multimode to multiopen
* Add -multimode to open multiple files into split. (#2689)
* Include mac arm binary in release scripts
* Add darwin arm64 prebuilt binary
* description different from JSON real default (#2680)
* fix: allow binding the minus key, fixes #2471 (#2617)
* Doc changes (#2646)
* Comment plugin: improve commenting multi-line selection (#2668)
* Fix perl syntax file
* Add CUDA syntax support (#2652)
* Improve buffer view relocation after jumping to a far-away location
(#2628)
* Improve Julia syntax highlighting (#2643)
* Syntax: added support for Smalltalk (#2626)
* Fix incorrect LastVisualX after changing bufWidth w/o resize (#2629)
* Fix "no" when replacing with empty string (#2641)
* Update readme
* Bump clipper
* Fix save with sudo for large file sizes
* Added openSUSE installation command (#2587)
* Add better explanation about find
* Bump tcell
* Document FindLiteral default binding
* Fix relocate at the end of buffer when scrollmargin is 0 (#2578)
* Revert adding 'git-rebase-todo' to the main git syntax highlighting
file (#2564)
* Add justfile syntax (#2523)
* Add template literal string highlighting to typescript (#2525)
* Restore installation instructions for Debian and Ubuntu. (#2530)
* Use shell job for terminal callback
* Ensure screen cannot draw during a term prompt
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-107=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
micro-editor-2.0.13-bp155.2.3.1
References:
1
0
10 Apr '24
# Recommended update for checkmedia
Announcement ID: SUSE-RU-2024:1191-1
Rating: moderate
References:
* bsc#1211953
* bsc#1220972
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for checkmedia fixes the following issues:
* tagmedia: fix size detection for block devices (bsc#1220972)
* Update to version 6.3
* Do not select EFI System Partition for digest calculation (bsc#1211953)
* Use default for SKIPSECTORS only for RH media
* Add man pages for checkmedia and tagmedia
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1191=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1191=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1191=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libmediacheck6-debuginfo-6.3-150400.3.3.1
* libmediacheck6-6.3-150400.3.3.1
* libmediacheck-devel-6.3-150400.3.3.1
* checkmedia-6.3-150400.3.3.1
* checkmedia-debugsource-6.3-150400.3.3.1
* checkmedia-debuginfo-6.3-150400.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libmediacheck6-debuginfo-6.3-150400.3.3.1
* libmediacheck6-6.3-150400.3.3.1
* libmediacheck-devel-6.3-150400.3.3.1
* checkmedia-6.3-150400.3.3.1
* checkmedia-debugsource-6.3-150400.3.3.1
* checkmedia-debuginfo-6.3-150400.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libmediacheck6-debuginfo-6.3-150400.3.3.1
* libmediacheck6-6.3-150400.3.3.1
* libmediacheck-devel-6.3-150400.3.3.1
* checkmedia-6.3-150400.3.3.1
* checkmedia-debugsource-6.3-150400.3.3.1
* checkmedia-debuginfo-6.3-150400.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1211953
* https://bugzilla.suse.com/show_bug.cgi?id=1220972
1
0
# Security update for less
Announcement ID: SUSE-SU-2024:1192-1
Rating: important
References:
* bsc#1219901
Cross-References:
* CVE-2022-48624
CVSS scores:
* CVE-2022-48624 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for less fixes the following issues:
* CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell
metacharacters (bsc#1219901).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1192=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1192=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1192=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1192=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1192=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1192=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1192=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1192=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1192=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1192=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1192=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1192=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
## References:
* https://www.suse.com/security/cve/CVE-2022-48624.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219901
1
0
SUSE-RU-2024:1194-1: moderate: Recommended update for post-build-checks-malwarescan
by OPENSUSE-UPDATES 10 Apr '24
by OPENSUSE-UPDATES 10 Apr '24
10 Apr '24
# Recommended update for post-build-checks-malwarescan
Announcement ID: SUSE-RU-2024:1194-1
Rating: moderate
References:
* bsc#1222509
Affected Products:
* openSUSE Leap 15.4
An update that has one fix can now be installed.
## Description:
This update for post-build-checks-malwarescan fixes the following issues:
* EXCLUDELIST: Filter Python tarballs due to false positive (bsc#1222509)
Win.Virus.Expiro-10026576-0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1194=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* post-build-checks-malwarescan-0.1-150400.15.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222509
1
0
SUSE-RU-2024:1195-1: moderate: Recommended update for post-build-checks-malwarescan
by OPENSUSE-UPDATES 10 Apr '24
by OPENSUSE-UPDATES 10 Apr '24
10 Apr '24
# Recommended update for post-build-checks-malwarescan
Announcement ID: SUSE-RU-2024:1195-1
Rating: moderate
References:
* bsc#1222509
Affected Products:
* openSUSE Leap 15.5
An update that has one fix can now be installed.
## Description:
This update for post-build-checks-malwarescan fixes the following issues:
* EXCLUDELIST: Filter Python tarballs due to false positive (bsc#1222509)
Win.Virus.Expiro-10026576-0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1195=1 openSUSE-SLE-15.5-2024-1195=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* post-build-checks-malwarescan-0.1-150500.20.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222509
1
0
10 Apr '24
# Recommended update for nvme-cli
Announcement ID: SUSE-RU-2024:1197-1
Rating: moderate
References:
* bsc#1213768
* bsc#1215994
* bsc#1220971
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has three fixes can now be installed.
## Description:
This update for nvme-cli fixes the following issues:
* Version update and nvme-netapp fix. Adding nspath tlv handling (bsc#1220971)
* Connection reuse issue when multiple Host NQNs are used for the same host
(bsc#1213768)
* Include nvme-cli updates for NetApp udev rule (bsc#1215994)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1197=1 openSUSE-SLE-15.5-2024-1197=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1197=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1197=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* nvme-cli-debuginfo-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-debugsource-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-2.4+32.g2e2531a-150500.4.15.3
* openSUSE Leap 15.5 (noarch)
* nvme-cli-zsh-completion-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-bash-completion-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-regress-script-2.4+32.g2e2531a-150500.4.15.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* nvme-cli-debuginfo-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-debugsource-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-2.4+32.g2e2531a-150500.4.15.3
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nvme-cli-debuginfo-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-debugsource-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-2.4+32.g2e2531a-150500.4.15.3
* Basesystem Module 15-SP5 (noarch)
* nvme-cli-zsh-completion-2.4+32.g2e2531a-150500.4.15.3
* nvme-cli-bash-completion-2.4+32.g2e2531a-150500.4.15.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1213768
* https://bugzilla.suse.com/show_bug.cgi?id=1215994
* https://bugzilla.suse.com/show_bug.cgi?id=1220971
1
0
SUSE-SU-2024:1183-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)
by OPENSUSE-UPDATES 10 Apr '24
by OPENSUSE-UPDATES 10 Apr '24
10 Apr '24
# Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1183-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_18 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1183=1 SUSE-2024-1188=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1183=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1188=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-8-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-7-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-7-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-8-150500.2.1
* kernel-livepatch-5_14_21-150500_13_11-rt-8-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1184-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)
by OPENSUSE-UPDATES 10 Apr '24
by OPENSUSE-UPDATES 10 Apr '24
10 Apr '24
# Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1184-1
Rating: important
References:
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_30 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1186=1 SUSE-2024-1187=1 SUSE-2024-1184=1
SUSE-2024-1185=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1186=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1187=1 SUSE-SLE-Module-Live-
Patching-15-SP5-2024-1184=1 SUSE-SLE-Module-Live-Patching-15-SP5-2024-1185=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-4-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-4-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-5-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-4-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-6-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-4-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-4-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-5-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_27-rt-5-150500.2.1
* kernel-livepatch-5_14_21-150500_13_30-rt-4-150500.2.1
* kernel-livepatch-5_14_21-150500_13_24-rt-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-6-150500.2.1
* kernel-livepatch-5_14_21-150500_13_21-rt-6-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
SUSE-SU-2024:1181-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)
by OPENSUSE-UPDATES 09 Apr '24
by OPENSUSE-UPDATES 09 Apr '24
09 Apr '24
# Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1181-1
Rating: important
References:
* bsc#1218613
* bsc#1219078
* bsc#1219296
* bsc#1219432
Cross-References:
* CVE-2023-42753
* CVE-2023-52340
* CVE-2024-0565
* CVE-2024-1085
CVSS scores:
* CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_13_5 fixes several issues.
The following security issues were fixed:
* CVE-2024-0565: Fixed an out-of-bounds memory read flaw in
receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
* CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter
subsystem. This issue may have allowed a local user to crash the system or
potentially escalate their privileges (bsc#1218613).
* CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the
nft_setelem_catchall_deactivate() function (bsc#1219432).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1181=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2024-1182=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1182=1 SUSE-2024-1181=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-10-150500.9.1
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-10-150500.9.1
* kernel-livepatch-5_14_21-150500_11-rt-10-150500.9.1
* kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_5-rt-9-150500.2.1
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-10-150500.9.1
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-10-150500.9.1
* kernel-livepatch-5_14_21-150500_11-rt-10-150500.9.1
* kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-9-150500.2.1
* kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-9-150500.2.1
* kernel-livepatch-5_14_21-150500_13_5-rt-9-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42753.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2024-0565.html
* https://www.suse.com/security/cve/CVE-2024-1085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218613
* https://bugzilla.suse.com/show_bug.cgi?id=1219078
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1219432
1
0
09 Apr '24
# Security update for qt6-base
Announcement ID: SUSE-SU-2024:1174-1
Rating: moderate
References:
* bsc#1221926
Cross-References:
* CVE-2024-30161
CVSS scores:
* CVE-2024-30161 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for qt6-base fixes the following issues:
* CVE-2024-30161: Fixed QNetworkReply header data access via a dangling
pointer (bsc#1221926).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1174=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1174=1 openSUSE-SLE-15.5-2024-1174=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1174=1
## Package List:
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* SUSE Package Hub 15 15-SP5 (noarch)
* qt6-base-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-printsupport-cups-debuginfo-6.4.2-150500.3.17.1
* qt6-test-private-devel-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-printsupport-cups-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-6.4.2-150500.3.17.1
* qt6-base-docs-html-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* qt6-platformsupport-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* qt6-sql-private-devel-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* qt6-printsupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-docs-qch-6.4.2-150500.3.17.1
* qt6-sql-mysql-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-private-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-sql-mysql-debuginfo-6.4.2-150500.3.17.1
* qt6-xml-private-devel-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-private-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (noarch)
* qt6-base-private-devel-6.4.2-150500.3.17.1
* qt6-base-devel-6.4.2-150500.3.17.1
* qt6-docs-common-6.4.2-150500.3.17.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30161.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221926
1
0
SUSE-RU-2024:1175-1: moderate: Recommended update for multipath-tools
by OPENSUSE-UPDATES 09 Apr '24
by OPENSUSE-UPDATES 09 Apr '24
09 Apr '24
# Recommended update for multipath-tools
Announcement ID: SUSE-RU-2024:1175-1
Rating: moderate
References:
* bsc#1212440
* bsc#1213809
* bsc#1219142
* bsc#1220374
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for multipath-tools fixes the following issues:
* Fixed activation of LVM volume groups during coldplug (bsc#1219142)
* Avoid changing SCSI timeouts in "multipath -d" (bsc#1213809)
* Fixed dev_loss_tmo even if not set in configuration (bsc#1212440)
* Backport of upstream bug fixes (bsc#1220374):
* Avoid setting queue_if_no_path on multipath maps for which the no_path_retry
timeout has expired
* Fixed memory and error handling for code using aio (marginal path code,
directio path checker)
* libmultipath: fixed max_sectors_kb on adding path
* Fixed warnings reported by udevadm verify
* libmultipath: use directio checker for LIO targets
* multipathd.service: remove "Also=multipathd.socket"
* libmultipathd: avoid parsing errors due to unsupported designators
* libmultipath: return 'pending' state when port is in transition
* multipath.rules: fixed "smart" bug with failed valid path check
* libmpathpersist: fixed resource leak in update_map_pr()
* libmultipath: keep renames from stopping other multipath actions
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1175=1 openSUSE-SLE-15.5-2024-1175=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1175=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1175=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libdmmp0_2_0-0.9.4+117+suse.87f2634-150500.3.9.1
* kpartx-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debugsource-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-devel-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-0.9.4+117+suse.87f2634-150500.3.9.1
* libdmmp-devel-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-0.9.4+117+suse.87f2634-150500.3.9.1
* kpartx-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* libdmmp0_2_0-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* kpartx-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debugsource-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-0.9.4+117+suse.87f2634-150500.3.9.1
* kpartx-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libdmmp0_2_0-0.9.4+117+suse.87f2634-150500.3.9.1
* kpartx-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debugsource-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-devel-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-0.9.4+117+suse.87f2634-150500.3.9.1
* libdmmp-devel-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-0.9.4+117+suse.87f2634-150500.3.9.1
* kpartx-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* multipath-tools-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* libdmmp0_2_0-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
* libmpath0-debuginfo-0.9.4+117+suse.87f2634-150500.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212440
* https://bugzilla.suse.com/show_bug.cgi?id=1213809
* https://bugzilla.suse.com/show_bug.cgi?id=1219142
* https://bugzilla.suse.com/show_bug.cgi?id=1220374
1
0
09 Apr '24
# Recommended update for hwdata
Announcement ID: SUSE-RU-2024:1176-1
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
An update that can now be installed.
## Description:
This update for hwdata fixes the following issues:
* Update to 0.380
* Update pci, usb and vendor ids
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1176=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1176=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1176=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1176=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1176=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1176=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1176=1
* SUSE Manager Proxy 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1176=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1176=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1176=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1176=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1176=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1176=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1176=1
## Package List:
* SUSE Manager Client Tools for SLE 15 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* hwdata-0.380-150000.3.68.1
* Basesystem Module 15-SP5 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Manager Proxy 4.3 Module 4.3 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Manager Server 4.3 Module 4.3 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* hwdata-0.380-150000.3.68.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* hwdata-0.380-150000.3.68.1
* openSUSE Leap Micro 5.3 (noarch)
* hwdata-0.380-150000.3.68.1
* openSUSE Leap Micro 5.4 (noarch)
* hwdata-0.380-150000.3.68.1
* openSUSE Leap 15.5 (noarch)
* hwdata-0.380-150000.3.68.1
1
0
SUSE-RU-2024:1177-1: moderate: Recommended update for multipath-tools
by OPENSUSE-UPDATES 09 Apr '24
by OPENSUSE-UPDATES 09 Apr '24
09 Apr '24
# Recommended update for multipath-tools
Announcement ID: SUSE-RU-2024:1177-1
Rating: moderate
References:
* bsc#1212440
* bsc#1213809
* bsc#1219142
* bsc#1220374
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has four fixes can now be installed.
## Description:
This update for multipath-tools fixes the following issues:
* Fixed activation of LVM volume groups during coldplug (bsc#1219142)
* Avoid changing SCSI timeouts in "multipath -d" (bsc#1213809)
* Fixed dev_loss_tmo even if not set in configuration (bsc#1212440)
* Backport of upstream bug fixes (bsc#1220374):
* Avoid setting queue_if_no_path on multipath maps for which the no_path_retry
timeout has expired
* Fixed memory and error handling for code using aio (marginal path code,
directio path checker)
* libmultipath: fixed max_sectors_kb on adding path
* Fixed warnings reported by udevadm verify
* libmultipath: use directio checker for LIO targets
* multipathd.service: remove "Also=multipathd.socket"
* libmultipathd: avoid parsing errors due to unsupported designators
* libmultipath: return 'pending' state when port is in transition
* multipath.rules: fixed "smart" bug with failed valid path check
* libmpathpersist: fixed resource leak in update_map_pr()
* libmultipath: keep renames from stopping other multipath actions
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1177=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1177=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1177=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1177=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1177=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1177=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1177=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1177=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1177=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1177=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1177=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1177=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1177=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1177=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1177=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Manager Proxy 4.3 (x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kpartx-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-devel-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libmpath0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debugsource-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-0.9.0+161+suse.a26bd4c-150400.4.19.1
* multipath-tools-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
* kpartx-0.9.0+161+suse.a26bd4c-150400.4.19.1
* libdmmp0_2_0-debuginfo-0.9.0+161+suse.a26bd4c-150400.4.19.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1212440
* https://bugzilla.suse.com/show_bug.cgi?id=1213809
* https://bugzilla.suse.com/show_bug.cgi?id=1219142
* https://bugzilla.suse.com/show_bug.cgi?id=1220374
1
0
09 Apr '24
# Security update for util-linux
Announcement ID: SUSE-SU-2024:1169-1
Rating: important
References:
* bsc#1207987
* bsc#1220117
* bsc#1221831
Cross-References:
* CVE-2024-28085
CVSS scores:
* CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for util-linux fixes the following issues:
* CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1169=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1169=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1169=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1169=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1169=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1169=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1169=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1169=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1169=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1169=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1169=1
## Package List:
* SUSE Manager Proxy 4.3 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Proxy 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Manager Server 4.3 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libmount-devel-static-2.37.2-150400.8.29.1
* libsmartcols-devel-static-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk-devel-static-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* python3-libmount-debugsource-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libmount-devel-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libblkid-devel-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libfdisk-devel-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libsmartcols1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-32bit-2.37.2-150400.8.29.1
* libuuid-devel-32bit-2.37.2-150400.8.29.1
* libfdisk1-32bit-2.37.2-150400.8.29.1
* libfdisk1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-32bit-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libuuid1-64bit-debuginfo-2.37.2-150400.8.29.1
* libfdisk-devel-64bit-2.37.2-150400.8.29.1
* libsmartcols1-64bit-2.37.2-150400.8.29.1
* libmount1-64bit-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-64bit-2.37.2-150400.8.29.1
* libblkid1-64bit-2.37.2-150400.8.29.1
* libmount-devel-64bit-2.37.2-150400.8.29.1
* libuuid-devel-64bit-2.37.2-150400.8.29.1
* libsmartcols1-64bit-debuginfo-2.37.2-150400.8.29.1
* libblkid1-64bit-debuginfo-2.37.2-150400.8.29.1
* libblkid-devel-64bit-2.37.2-150400.8.29.1
* libmount1-64bit-2.37.2-150400.8.29.1
* libfdisk1-64bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-64bit-2.37.2-150400.8.29.1
* libsmartcols-devel-64bit-2.37.2-150400.8.29.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libblkid1-32bit-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* util-linux-systemd-debuginfo-2.37.2-150400.8.29.1
* libfdisk1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debuginfo-2.37.2-150400.8.29.1
* libmount1-2.37.2-150400.8.29.1
* libmount1-debuginfo-2.37.2-150400.8.29.1
* util-linux-debugsource-2.37.2-150400.8.29.1
* libsmartcols-devel-2.37.2-150400.8.29.1
* util-linux-systemd-2.37.2-150400.8.29.1
* libblkid-devel-2.37.2-150400.8.29.1
* libfdisk1-2.37.2-150400.8.29.1
* util-linux-2.37.2-150400.8.29.1
* libblkid1-2.37.2-150400.8.29.1
* libblkid-devel-static-2.37.2-150400.8.29.1
* libuuid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-static-2.37.2-150400.8.29.1
* libsmartcols1-debuginfo-2.37.2-150400.8.29.1
* libuuid1-2.37.2-150400.8.29.1
* util-linux-systemd-debugsource-2.37.2-150400.8.29.1
* libmount-devel-2.37.2-150400.8.29.1
* uuidd-debuginfo-2.37.2-150400.8.29.1
* libsmartcols1-2.37.2-150400.8.29.1
* libfdisk-devel-2.37.2-150400.8.29.1
* uuidd-2.37.2-150400.8.29.1
* libblkid1-debuginfo-2.37.2-150400.8.29.1
* libuuid-devel-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* util-linux-lang-2.37.2-150400.8.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libblkid1-32bit-2.37.2-150400.8.29.1
* libblkid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libuuid1-32bit-2.37.2-150400.8.29.1
* libmount1-32bit-2.37.2-150400.8.29.1
* libuuid1-32bit-debuginfo-2.37.2-150400.8.29.1
* libmount1-32bit-debuginfo-2.37.2-150400.8.29.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207987
* https://bugzilla.suse.com/show_bug.cgi?id=1220117
* https://bugzilla.suse.com/show_bug.cgi?id=1221831
1
0
09 Apr '24
# Security update for util-linux
Announcement ID: SUSE-SU-2024:1170-1
Rating: important
References:
* bsc#1194038
* bsc#1207987
* bsc#1221831
Cross-References:
* CVE-2024-28085
CVSS scores:
* CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for util-linux fixes the following issues:
* CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1170=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1170=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1170=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1170=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1170=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1170=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1170=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* python3-libmount-debugsource-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* python3-libmount-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-static-2.36.2-150300.4.41.1
* libsmartcols-devel-static-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* python3-libmount-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libmount-devel-static-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-32bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-32bit-2.36.2-150300.4.41.1
* libuuid-devel-32bit-2.36.2-150300.4.41.1
* libblkid-devel-32bit-2.36.2-150300.4.41.1
* libsmartcols-devel-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libmount-devel-32bit-2.36.2-150300.4.41.1
* libfdisk1-32bit-2.36.2-150300.4.41.1
* libfdisk1-32bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libmount-devel-64bit-2.36.2-150300.4.41.1
* libsmartcols1-64bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-64bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-64bit-2.36.2-150300.4.41.1
* libuuid1-64bit-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-64bit-2.36.2-150300.4.41.1
* libuuid1-64bit-2.36.2-150300.4.41.1
* libfdisk1-64bit-2.36.2-150300.4.41.1
* libblkid-devel-64bit-2.36.2-150300.4.41.1
* libuuid-devel-64bit-2.36.2-150300.4.41.1
* libblkid1-64bit-2.36.2-150300.4.41.1
* libmount1-64bit-2.36.2-150300.4.41.1
* libsmartcols-devel-64bit-2.36.2-150300.4.41.1
* libblkid1-64bit-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-64bit-debuginfo-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libblkid-devel-static-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libuuid-devel-static-2.36.2-150300.4.41.1
* libblkid-devel-2.36.2-150300.4.41.1
* libmount-devel-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* libfdisk-devel-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* libsmartcols-devel-2.36.2-150300.4.41.1
* uuidd-debuginfo-2.36.2-150300.4.41.1
* uuidd-2.36.2-150300.4.41.1
* libuuid-devel-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (noarch)
* util-linux-lang-2.36.2-150300.4.41.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libuuid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libblkid1-32bit-debuginfo-2.36.2-150300.4.41.1
* libuuid1-32bit-2.36.2-150300.4.41.1
* libmount1-32bit-debuginfo-2.36.2-150300.4.41.1
* libmount1-32bit-2.36.2-150300.4.41.1
* libblkid1-32bit-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libuuid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debugsource-2.36.2-150300.4.41.1
* util-linux-debuginfo-2.36.2-150300.4.41.1
* libfdisk1-debuginfo-2.36.2-150300.4.41.1
* util-linux-systemd-debuginfo-2.36.2-150300.4.41.1
* libblkid1-debuginfo-2.36.2-150300.4.41.1
* util-linux-debugsource-2.36.2-150300.4.41.1
* libsmartcols1-2.36.2-150300.4.41.1
* libsmartcols1-debuginfo-2.36.2-150300.4.41.1
* libuuid1-2.36.2-150300.4.41.1
* libfdisk1-2.36.2-150300.4.41.1
* libmount1-debuginfo-2.36.2-150300.4.41.1
* libmount1-2.36.2-150300.4.41.1
* util-linux-systemd-2.36.2-150300.4.41.1
* util-linux-2.36.2-150300.4.41.1
* libblkid1-2.36.2-150300.4.41.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28085.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194038
* https://bugzilla.suse.com/show_bug.cgi?id=1207987
* https://bugzilla.suse.com/show_bug.cgi?id=1221831
1
0
openSUSE-RU-2024:0105-1: moderate: Recommended update for virtme
by maintenance@opensuse.org 08 Apr '24
by maintenance@opensuse.org 08 Apr '24
08 Apr '24
openSUSE Recommended Update: Recommended update for virtme
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0105-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for virtme fixes the following issues:
Update to 1.23:
* Fix breakage with QEMU 8.2.2
* Change behaviour of --kconfig, that will always override the .config if
present (since there is not reason to use
--kconfig and not update the .config).
* It is now possible to force the legacy cgroup v1 using the
option -a "SYSTEMD_CGROUP_ENABLE_LEGACY_FORCE=1": the vng init script
will mimic systemd behavior and mount cgroup v1, instead of v2.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-105=1
Package List:
- openSUSE Backports SLE-15-SP5 (noarch):
virtme-1.23-bp155.5.11.1
References:
1
0
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1163-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1163=1 openSUSE-SLE-15.5-2024-1163=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1163=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-apiserver-1.23.17-150500.3.9.1
* kubernetes1.23-client-1.23.17-150500.3.9.1
* kubernetes1.23-proxy-1.23.17-150500.3.9.1
* kubernetes1.23-scheduler-1.23.17-150500.3.9.1
* kubernetes1.23-kubeadm-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-1.23.17-150500.3.9.1
* kubernetes1.23-controller-manager-1.23.17-150500.3.9.1
* kubernetes1.23-client-common-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-common-1.23.17-150500.3.9.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.23-client-fish-completion-1.23.17-150500.3.9.1
* kubernetes1.23-client-bash-completion-1.23.17-150500.3.9.1
* openSUSE Leap 15.5 (ppc64le)
* kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.9.1
* kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.9.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-client-1.23.17-150500.3.9.1
* kubernetes1.23-client-common-1.23.17-150500.3.9.1
* Containers Module 15-SP5 (ppc64le)
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1164-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1164=1 openSUSE-SLE-15.5-2024-1164=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1164=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-client-1.24.17-150500.3.13.1
* kubernetes1.24-kubeadm-1.24.17-150500.3.13.1
* kubernetes1.24-kubelet-common-1.24.17-150500.3.13.1
* kubernetes1.24-kubelet-1.24.17-150500.3.13.1
* kubernetes1.24-controller-manager-1.24.17-150500.3.13.1
* kubernetes1.24-client-common-1.24.17-150500.3.13.1
* kubernetes1.24-apiserver-1.24.17-150500.3.13.1
* kubernetes1.24-proxy-1.24.17-150500.3.13.1
* kubernetes1.24-scheduler-1.24.17-150500.3.13.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.24-client-bash-completion-1.24.17-150500.3.13.1
* kubernetes1.24-client-fish-completion-1.24.17-150500.3.13.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.24-client-1.24.17-150500.3.13.1
* kubernetes1.24-client-common-1.24.17-150500.3.13.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
08 Apr '24
# Security update for kubernetes1.23
Announcement ID: SUSE-SU-2024:1166-1
Rating: moderate
References:
* bsc#1219964
Cross-References:
* CVE-2024-0793
CVSS scores:
* CVE-2024-0793 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* Upgrade from v1.26.9 to v1.26.14
* CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest.
(bsc#1219964)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1166=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1166=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1166=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
* kubernetes1.26-proxy-1.26.14-150400.9.6.1
* kubernetes1.26-controller-manager-1.26.14-150400.9.6.1
* kubernetes1.26-kubelet-1.26.14-150400.9.6.1
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-kubeadm-1.26.14-150400.9.6.1
* kubernetes1.26-scheduler-1.26.14-150400.9.6.1
* kubernetes1.26-apiserver-1.26.14-150400.9.6.1
* kubernetes1.26-kubelet-common-1.26.14-150400.9.6.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.26-client-bash-completion-1.26.14-150400.9.6.1
* kubernetes1.26-client-fish-completion-1.26.14-150400.9.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.14-150400.9.6.1
* kubernetes1.26-client-common-1.26.14-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-0793.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219964
1
0
08 Apr '24
# Security update for nghttp2
Announcement ID: SUSE-SU-2024:1167-1
Rating: important
References:
* bsc#1221399
Cross-References:
* CVE-2024-28182
CVSS scores:
* CVE-2024-28182 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for nghttp2 fixes the following issues:
* CVE-2024-28182: Fixed denial of service via http/2 continuation frames
(bsc#1221399)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1167=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1167=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1167=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1167=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1167=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1167=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1167=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1167=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1167=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1167=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1167=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1167=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1167=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1167=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1167=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1167=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* nghttp2-python-debugsource-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* python3-nghttp2-1.40.0-150200.17.1
* python3-nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* openSUSE Leap 15.5 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2_asio1-32bit-1.40.0-150200.17.1
* libnghttp2_asio1-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* Basesystem Module 15-SP5 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Manager Proxy 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Manager Server 4.3 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libnghttp2-14-1.40.0-150200.17.1
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio1-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* libnghttp2_asio-devel-1.40.0-150200.17.1
* libnghttp2-devel-1.40.0-150200.17.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libnghttp2-14-32bit-1.40.0-150200.17.1
* libnghttp2-14-32bit-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libnghttp2-14-debuginfo-1.40.0-150200.17.1
* libnghttp2-14-1.40.0-150200.17.1
* nghttp2-debugsource-1.40.0-150200.17.1
* nghttp2-debuginfo-1.40.0-150200.17.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28182.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221399
1
0
08 Apr '24
# Security update for libvirt
Announcement ID: SUSE-SU-2024:1099-1
Rating: moderate
References:
* bsc#1214223
* bsc#1216980
* bsc#1220512
* bsc#1221237
* bsc#1221468
* bsc#1221815
Cross-References:
* CVE-2024-1441
* CVE-2024-2494
* CVE-2024-2496
CVSS scores:
* CVE-2024-1441 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-2494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities and has three security fixes can now
be installed.
## Description:
This update for libvirt fixes the following issues:
* CVE-2024-2494: Add a check for negative array lengths before allocation to
prevent potential DoS. (bsc#1221815)
* CVE-2024-2496: Fixed NULL pointer dereference in
udevConnectListAllInterfaces() (bsc#1221468).
* CVE-2024-1441: Fix off-by-one error in udevListInterfacesByStatus
(bsc#1221237)
* qemu: domain: Fix logic when tainting domain (bsc#1220512)
* conf: Remove some firmware validation checks (bsc#1216980)
* libxl: Fix connection to modular network daemon (bsc#1214223)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1099=1 openSUSE-SLE-15.5-2024-1099=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1099=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1099=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1099=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libvirt-libs-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-lxc-9.0.0-150500.6.20.1
* libvirt-daemon-lxc-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.20.1
* libvirt-lock-sanlock-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-client-9.0.0-150500.6.20.1
* libvirt-daemon-debuginfo-9.0.0-150500.6.20.1
* libvirt-libs-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-gluster-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-lock-sanlock-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-lxc-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-hooks-9.0.0-150500.6.20.1
* libvirt-daemon-config-network-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1
* libvirt-daemon-config-nwfilter-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-qemu-9.0.0-150500.6.20.1
* libvirt-debugsource-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-9.0.0-150500.6.20.1
* libvirt-daemon-9.0.0-150500.6.20.1
* libvirt-nss-debuginfo-9.0.0-150500.6.20.1
* libvirt-client-debuginfo-9.0.0-150500.6.20.1
* libvirt-nss-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-9.0.0-150500.6.20.1
* libvirt-client-qemu-9.0.0-150500.6.20.1
* libvirt-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.20.1
* wireshark-plugin-libvirt-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.20.1
* wireshark-plugin-libvirt-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1
* libvirt-devel-9.0.0-150500.6.20.1
* openSUSE Leap 15.5 (x86_64)
* libvirt-client-32bit-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-libxl-9.0.0-150500.6.20.1
* libvirt-devel-32bit-9.0.0-150500.6.20.1
* libvirt-daemon-xen-9.0.0-150500.6.20.1
* libvirt-daemon-driver-libxl-debuginfo-9.0.0-150500.6.20.1
* openSUSE Leap 15.5 (noarch)
* libvirt-doc-9.0.0-150500.6.20.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libvirt-devel-64bit-9.0.0-150500.6.20.1
* libvirt-client-64bit-debuginfo-9.0.0-150500.6.20.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libvirt-libs-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-debuginfo-9.0.0-150500.6.20.1
* libvirt-client-9.0.0-150500.6.20.1
* libvirt-libs-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-qemu-9.0.0-150500.6.20.1
* libvirt-debugsource-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-9.0.0-150500.6.20.1
* libvirt-daemon-9.0.0-150500.6.20.1
* libvirt-client-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libvirt-libs-debuginfo-9.0.0-150500.6.20.1
* libvirt-debugsource-9.0.0-150500.6.20.1
* libvirt-libs-9.0.0-150500.6.20.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.20.1
* libvirt-lock-sanlock-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-client-9.0.0-150500.6.20.1
* libvirt-daemon-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.20.1
* libvirt-lock-sanlock-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1
* libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-hooks-9.0.0-150500.6.20.1
* libvirt-daemon-config-network-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1
* libvirt-daemon-config-nwfilter-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-qemu-9.0.0-150500.6.20.1
* libvirt-debugsource-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-9.0.0-150500.6.20.1
* libvirt-daemon-9.0.0-150500.6.20.1
* libvirt-nss-debuginfo-9.0.0-150500.6.20.1
* libvirt-client-debuginfo-9.0.0-150500.6.20.1
* libvirt-nss-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-network-9.0.0-150500.6.20.1
* libvirt-client-qemu-9.0.0-150500.6.20.1
* libvirt-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1
* libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1
* libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1
* libvirt-devel-9.0.0-150500.6.20.1
* Server Applications Module 15-SP5 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1
* Server Applications Module 15-SP5 (noarch)
* libvirt-doc-9.0.0-150500.6.20.1
* Server Applications Module 15-SP5 (x86_64)
* libvirt-daemon-driver-libxl-debuginfo-9.0.0-150500.6.20.1
* libvirt-daemon-driver-libxl-9.0.0-150500.6.20.1
* libvirt-daemon-xen-9.0.0-150500.6.20.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1441.html
* https://www.suse.com/security/cve/CVE-2024-2494.html
* https://www.suse.com/security/cve/CVE-2024-2496.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214223
* https://bugzilla.suse.com/show_bug.cgi?id=1216980
* https://bugzilla.suse.com/show_bug.cgi?id=1220512
* https://bugzilla.suse.com/show_bug.cgi?id=1221237
* https://bugzilla.suse.com/show_bug.cgi?id=1221468
* https://bugzilla.suse.com/show_bug.cgi?id=1221815
1
0
08 Apr '24
# Security update for libvirt
Announcement ID: SUSE-SU-2024:1100-1
Rating: moderate
References:
* bsc#1221749
* bsc#1221815
Cross-References:
* CVE-2024-2494
CVSS scores:
* CVE-2024-2494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for libvirt fixes the following issues:
* CVE-2024-2494: Add a check for negative array lengths before allocation to
prevent potential DoS. (bsc#1221815)
The following non-security bug was fixed:
* Avoid memleak in virNodeDeviceGetPCIVPDDynamicCap() (bsc#1221749).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1100=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1100=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1100=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1100=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1100=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1100=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1100=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1100=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1100=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1100=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1100=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libvirt-daemon-driver-lxc-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-lxc-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* wireshark-plugin-libvirt-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-gluster-8.0.0-150400.7.11.2
* wireshark-plugin-libvirt-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-gluster-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-lxc-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (x86_64)
* libvirt-client-32bit-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-32bit-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libvirt-client-64bit-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-64bit-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* SUSE Manager Proxy 4.3 (x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Proxy 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libvirt-daemon-driver-qemu-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-debuginfo-8.0.0-150400.7.11.2
* libvirt-client-8.0.0-150400.7.11.2
* libvirt-libs-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-debuginfo-8.0.0-150400.7.11.2
* libvirt-lock-sanlock-8.0.0-150400.7.11.2
* libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2
* libvirt-libs-debuginfo-8.0.0-150400.7.11.2
* libvirt-nss-8.0.0-150400.7.11.2
* libvirt-daemon-config-nwfilter-8.0.0-150400.7.11.2
* libvirt-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-scsi-debuginfo-8.0.0-150400.7.11.2
* libvirt-debugsource-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nodedev-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2
* libvirt-daemon-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-config-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-8.0.0-150400.7.11.2
* libvirt-client-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-qemu-8.0.0-150400.7.11.2
* libvirt-daemon-driver-network-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2
* libvirt-daemon-driver-secret-8.0.0-150400.7.11.2
* libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2
* libvirt-daemon-driver-interface-debuginfo-8.0.0-150400.7.11.2
* libvirt-devel-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-disk-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-hooks-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (noarch)
* libvirt-doc-8.0.0-150400.7.11.2
* SUSE Manager Server 4.3 (x86_64)
* libvirt-daemon-driver-libxl-8.0.0-150400.7.11.2
* libvirt-daemon-driver-libxl-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-debuginfo-8.0.0-150400.7.11.2
* libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2
* libvirt-daemon-xen-8.0.0-150400.7.11.2
## References:
* https://www.suse.com/security/cve/CVE-2024-2494.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221749
* https://bugzilla.suse.com/show_bug.cgi?id=1221815
1
0
# Security update for xen
Announcement ID: SUSE-SU-2024:1101-1
Rating: moderate
References:
* bsc#1221332
* bsc#1221334
Cross-References:
* CVE-2023-28746
* CVE-2024-2193
CVSS scores:
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-2193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-28746: Register File Data Sampling (bsc#1221332)
* CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1101=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1101=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1101=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1101=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1101=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1101=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1101=1
## Package List:
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-tools-domU-4.16.5_14-150400.4.52.1
* xen-tools-domU-debuginfo-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-devel-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (x86_64)
* xen-libs-32bit-4.16.5_14-150400.4.52.1
* xen-libs-32bit-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* xen-doc-html-4.16.5_14-150400.4.52.1
* xen-4.16.5_14-150400.4.52.1
* xen-tools-4.16.5_14-150400.4.52.1
* xen-tools-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (noarch)
* xen-tools-xendomains-wait-disk-4.16.5_14-150400.4.52.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* xen-libs-64bit-4.16.5_14-150400.4.52.1
* xen-libs-64bit-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap Micro 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* openSUSE Leap Micro 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* xen-libs-4.16.5_14-150400.4.52.1
* xen-debugsource-4.16.5_14-150400.4.52.1
* xen-libs-debuginfo-4.16.5_14-150400.4.52.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2024-2193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221332
* https://bugzilla.suse.com/show_bug.cgi?id=1221334
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:1103-1
Rating: important
References:
* bsc#1205316
* bsc#1209554
* bsc#1218484
* bsc#1220062
* bsc#1220065
* bsc#1220134
* jsc#PED-7366
* jsc#PED-8113
Cross-References:
* CVE-2023-1544
* CVE-2023-6693
* CVE-2024-24474
* CVE-2024-26327
* CVE-2024-26328
CVSS scores:
* CVE-2023-1544 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H
* CVE-2023-1544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
* CVE-2023-6693 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-6693 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-24474 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-26327 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-26328 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves five vulnerabilities, contains two features and has one
security fix can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-26327: Fixed buffer overflow via invalid SR/IOV NumVFs value
(bsc#1220062).
* CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI
command (bsc#1220134).
* CVE-2023-6693: Fixed stack buffer overflow in virtio_net_flush_tx()
(bsc#1218484).
* CVE-2023-1544: Fixed out-of-bounds read in pvrdma_ring_next_elem_read()
(bsc#1209554).
* CVE-2024-26328: Fixed invalid NumVFs value handled in NVME SR/IOV
implementation (bsc#1220065).
The following non-security bug was fixed:
* Removing in-use mediated device should fail with error message instead of
hang (bsc#1205316).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1103=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1103=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1103=1 openSUSE-SLE-15.5-2024-1103=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1103=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1103=1
## Package List:
* SUSE Package Hub 15 15-SP5 (noarch)
* qemu-microvm-7.1.0-150500.49.12.1
* qemu-sgabios-8-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-block-nfs-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.12.1
* qemu-extra-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-7.1.0-150500.49.12.1
* qemu-audio-oss-7.1.0-150500.49.12.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-7.1.0-150500.49.12.1
* qemu-audio-jack-7.1.0-150500.49.12.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.12.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-7.1.0-150500.49.12.1
* qemu-block-gluster-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le)
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x x86_64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* SUSE Package Hub 15 15-SP5 (s390x)
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.12.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.12.1
* qemu-block-rbd-7.1.0-150500.49.12.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-dbus-7.1.0-150500.49.12.1
* qemu-lang-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-block-iscsi-7.1.0-150500.49.12.1
* qemu-ksm-7.1.0-150500.49.12.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-7.1.0-150500.49.12.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-ui-curses-7.1.0-150500.49.12.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-7.1.0-150500.49.12.1
* qemu-chardev-baum-7.1.0-150500.49.12.1
* qemu-block-ssh-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le x86_64)
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (noarch)
* qemu-sgabios-8-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (ppc64le)
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-kvm-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (s390x)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* Server Applications Module 15-SP5 (x86_64)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-dbus-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-block-iscsi-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1
* qemu-ksm-7.1.0-150500.49.12.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-7.1.0-150500.49.12.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-block-dmg-7.1.0-150500.49.12.1
* qemu-ui-curses-7.1.0-150500.49.12.1
* qemu-arm-7.1.0-150500.49.12.1
* qemu-audio-oss-7.1.0-150500.49.12.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-gtk-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* qemu-ui-dbus-7.1.0-150500.49.12.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.12.1
* qemu-block-nfs-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-qtest-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-alsa-7.1.0-150500.49.12.1
* qemu-ui-spice-app-7.1.0-150500.49.12.1
* qemu-x86-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-linux-user-debugsource-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-extra-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.12.1
* qemu-chardev-baum-7.1.0-150500.49.12.1
* qemu-block-gluster-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-lang-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.12.1
* qemu-headless-7.1.0-150500.49.12.1
* qemu-ppc-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-ppc-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-7.1.0-150500.49.12.1
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.12.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1
* qemu-audio-jack-7.1.0-150500.49.12.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.12.1
* qemu-block-ssh-debuginfo-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-ivshmem-tools-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (s390x x86_64 i586)
* qemu-kvm-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (noarch)
* qemu-microvm-7.1.0-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-sgabios-8-150500.49.12.1
* qemu-SLOF-7.1.0-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-skiboot-7.1.0-150500.49.12.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-7.1.0-150500.49.12.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1
* qemu-ui-opengl-7.1.0-150500.49.12.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-7.1.0-150500.49.12.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.12.1
* qemu-ui-spice-core-7.1.0-150500.49.12.1
* qemu-block-curl-7.1.0-150500.49.12.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.12.1
* qemu-audio-spice-7.1.0-150500.49.12.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.12.1
* qemu-hw-display-qxl-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.12.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.12.1
* qemu-chardev-spice-7.1.0-150500.49.12.1
* qemu-7.1.0-150500.49.12.1
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (aarch64)
* qemu-arm-7.1.0-150500.49.12.1
* qemu-arm-debuginfo-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-sgabios-8-150500.49.12.1
* qemu-ipxe-1.0.0+-150500.49.12.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* qemu-s390x-debuginfo-7.1.0-150500.49.12.1
* qemu-s390x-7.1.0-150500.49.12.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* qemu-x86-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-7.1.0-150500.49.12.1
* qemu-x86-debuginfo-7.1.0-150500.49.12.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.12.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debuginfo-7.1.0-150500.49.12.1
* qemu-tools-debuginfo-7.1.0-150500.49.12.1
* qemu-debugsource-7.1.0-150500.49.12.1
* qemu-tools-7.1.0-150500.49.12.1
## References:
* https://www.suse.com/security/cve/CVE-2023-1544.html
* https://www.suse.com/security/cve/CVE-2023-6693.html
* https://www.suse.com/security/cve/CVE-2024-24474.html
* https://www.suse.com/security/cve/CVE-2024-26327.html
* https://www.suse.com/security/cve/CVE-2024-26328.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205316
* https://bugzilla.suse.com/show_bug.cgi?id=1209554
* https://bugzilla.suse.com/show_bug.cgi?id=1218484
* https://bugzilla.suse.com/show_bug.cgi?id=1220062
* https://bugzilla.suse.com/show_bug.cgi?id=1220065
* https://bugzilla.suse.com/show_bug.cgi?id=1220134
* https://jira.suse.com/browse/PED-7366
* https://jira.suse.com/browse/PED-8113
1
0
08 Apr '24
# Security update for ncurses
Announcement ID: SUSE-SU-2024:1133-1
Rating: moderate
References:
* bsc#1220061
Cross-References:
* CVE-2023-45918
CVSS scores:
* CVE-2023-45918 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for ncurses fixes the following issues:
* CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color
file (bsc#1220061).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1133=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1133=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1133=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1133=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1133=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1133=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1133=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1133=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-1133=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1133=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1133=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1133=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* openSUSE Leap 15.5 (x86_64)
* ncurses-devel-32bit-debuginfo-6.1-150000.5.24.1
* libncurses5-32bit-debuginfo-6.1-150000.5.24.1
* ncurses5-devel-32bit-6.1-150000.5.24.1
* libncurses5-32bit-6.1-150000.5.24.1
* ncurses-devel-32bit-6.1-150000.5.24.1
* libncurses6-32bit-debuginfo-6.1-150000.5.24.1
* libncurses6-32bit-6.1-150000.5.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ncurses-devel-6.1-150000.5.24.1
* ncurses5-devel-6.1-150000.5.24.1
* tack-debuginfo-6.1-150000.5.24.1
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* tack-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* libncurses5-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* libncurses5-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* ncurses-devel-debuginfo-6.1-150000.5.24.1
* terminfo-iterm-6.1-150000.5.24.1
* terminfo-screen-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ncurses-devel-6.1-150000.5.24.1
* terminfo-base-6.1-150000.5.24.1
* tack-debuginfo-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* tack-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* ncurses-devel-debuginfo-6.1-150000.5.24.1
* terminfo-iterm-6.1-150000.5.24.1
* terminfo-screen-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* Basesystem Module 15-SP5 (x86_64)
* libncurses6-32bit-debuginfo-6.1-150000.5.24.1
* libncurses6-32bit-6.1-150000.5.24.1
* Development Tools Module 15-SP5 (x86_64)
* ncurses-devel-32bit-debuginfo-6.1-150000.5.24.1
* ncurses-devel-32bit-6.1-150000.5.24.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses5-debuginfo-6.1-150000.5.24.1
* ncurses5-devel-6.1-150000.5.24.1
* libncurses5-6.1-150000.5.24.1
* Legacy Module 15-SP5 (x86_64)
* libncurses5-32bit-debuginfo-6.1-150000.5.24.1
* libncurses5-32bit-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* terminfo-base-6.1-150000.5.24.1
* ncurses-debugsource-6.1-150000.5.24.1
* libncurses6-6.1-150000.5.24.1
* ncurses-utils-6.1-150000.5.24.1
* terminfo-6.1-150000.5.24.1
* libncurses6-debuginfo-6.1-150000.5.24.1
* ncurses-utils-debuginfo-6.1-150000.5.24.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45918.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220061
1
0
# Security update for c-ares
Announcement ID: SUSE-SU-2024:1136-1
Rating: moderate
References:
* bsc#1220279
Cross-References:
* CVE-2024-25629
CVSS scores:
* CVE-2024-25629 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for c-ares fixes the following issues:
* CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1136=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1136=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1136=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1136=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1136=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1136=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1136=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1136=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1136=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1136=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* c-ares-utils-debuginfo-1.19.1-150000.3.26.1
* c-ares-utils-1.19.1-150000.3.26.1
* c-ares-devel-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* c-ares-debugsource-1.19.1-150000.3.26.1
* openSUSE Leap 15.5 (x86_64)
* libcares2-32bit-1.19.1-150000.3.26.1
* libcares2-32bit-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* c-ares-devel-1.19.1-150000.3.26.1
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* c-ares-debugsource-1.19.1-150000.3.26.1
* libcares2-1.19.1-150000.3.26.1
* libcares2-debuginfo-1.19.1-150000.3.26.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25629.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220279
1
0
# Security update for helm
Announcement ID: SUSE-SU-2024:1137-1
Rating: moderate
References:
* bsc#1219969
* bsc#1220207
Cross-References:
* CVE-2024-25620
* CVE-2024-26147
CVSS scores:
* CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for helm fixes the following issues:
* CVE-2024-25620: Fixed with dependency management path traversal
(bsc#1219969).
* CVE-2024-26147: Fixed uninitialized variable in yaml parsing (bsc#1220207).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1137=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1137=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1137=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* helm-3.13.3-150000.1.32.1
* helm-debuginfo-3.13.3-150000.1.32.1
* openSUSE Leap 15.5 (noarch)
* helm-zsh-completion-3.13.3-150000.1.32.1
* helm-bash-completion-3.13.3-150000.1.32.1
* helm-fish-completion-3.13.3-150000.1.32.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* helm-3.13.3-150000.1.32.1
* helm-debuginfo-3.13.3-150000.1.32.1
* Containers Module 15-SP5 (noarch)
* helm-zsh-completion-3.13.3-150000.1.32.1
* helm-bash-completion-3.13.3-150000.1.32.1
* SUSE Package Hub 15 15-SP5 (noarch)
* helm-fish-completion-3.13.3-150000.1.32.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25620.html
* https://www.suse.com/security/cve/CVE-2024-26147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219969
* https://bugzilla.suse.com/show_bug.cgi?id=1220207
1
0
08 Apr '24
# Security update for ucode-intel
Announcement ID: SUSE-SU-2024:1139-1
Rating: moderate
References:
* bsc#1221323
Cross-References:
* CVE-2023-22655
* CVE-2023-28746
* CVE-2023-38575
* CVE-2023-39368
* CVE-2023-43490
CVSS scores:
* CVE-2023-22655 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-39368 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-43490 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for ucode-intel fixes the following issues:
* Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)
* CVE-2023-39368: Protection mechanism failure of bus lock regulator for some
Intel Processors may allow an unauthenticated user to potentially enable
denial of service via network access
* CVE-2023-38575: Non-transparent sharing of return predictor targets between
contexts in some Intel Processors may allow an authorized user to
potentially enable information disclosure via local access.
* CVE-2023-28746: Information exposure through microarchitectural state after
transient execution from some register files for some Intel Atom Processors
may allow an authenticated user to potentially enable information disclosure
via local access.
* CVE-2023-22655 Protection mechanism failure in some 3rd and 4th Generation
Intel Xeon Processors when using Intel SGX or Intel TDX may allow a
privileged user to potentially enable escalation of privilege via local
access.
* CVE-2023-43490: Incorrect calculation in microcode keying mechanism for some
Intel Xeon D Processors with Intel® SGX may allow a privileged user to
potentially enable information disclosure via local access.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1139=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1139=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1139=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1139=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1139=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1139=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1139=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1139=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1139=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1139=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1139=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1139=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1139=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1139=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1139=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1139=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1139=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1139=1
## Package List:
* openSUSE Leap Micro 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* openSUSE Leap Micro 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* openSUSE Leap 15.5 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20240312-150200.38.1
* Basesystem Module 15-SP5 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Proxy 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Manager Server 4.3 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Enterprise Storage 7.1 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20240312-150200.38.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20240312-150200.38.1
## References:
* https://www.suse.com/security/cve/CVE-2023-22655.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-38575.html
* https://www.suse.com/security/cve/CVE-2023-39368.html
* https://www.suse.com/security/cve/CVE-2023-43490.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221323
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1143-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1143=1 openSUSE-SLE-15.5-2024-1143=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1143=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150500.3.7.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* buildah-1.34.1-150500.3.7.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1144-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* Public Cloud Module 15-SP2
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.1
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Server 4.1
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1144=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1144=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1144=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1144=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1144=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1144=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1144=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1144=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1144=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1144=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1144=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1144=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1144=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1144=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150400.3.27.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* buildah-1.34.1-150400.3.27.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* cni-plugins-0.8.6-150100.3.22.3
* cni-0.7.1-150100.3.18.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:1145-1
Rating: important
References:
* bsc#1219563
* bsc#1220568
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability and has two security fixes can now be
installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
* Update to version 1.34.1 for compatibility with Docker 25.0 (which is not in
SLES yet, but will eventually be) (bsc#1219563). See the corresponding
release notes:
* https://github.com/containers/buildah/releases/tag/v1.34.1
* https://github.com/containers/buildah/releases/tag/v1.34.0
* https://github.com/containers/buildah/releases/tag/v1.33.0
* https://github.com/containers/buildah/releases/tag/v1.32.0
* https://github.com/containers/buildah/releases/tag/v1.31.0
* https://github.com/containers/buildah/releases/tag/v1.30.0
* Require cni-plugins (bsc#1220568)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1145=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1145=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1145=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1145=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1145=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* buildah-1.34.1-150300.8.22.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* buildah-1.34.1-150300.8.22.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219563
* https://bugzilla.suse.com/show_bug.cgi?id=1220568
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
08 Apr '24
# Security update for podman
Announcement ID: SUSE-SU-2024:1146-1
Rating: important
References:
* bsc#1221677
Cross-References:
* CVE-2024-1753
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for podman fixes the following issues:
* CVE-2024-1753: Fixed an issue to prevent a full container escape at build
time. (bsc#1221677)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1146=1 openSUSE-SLE-15.5-2024-1146=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1146=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1146=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* podman-remote-debuginfo-4.8.3-150500.3.9.1
* podman-remote-4.8.3-150500.3.9.1
* podman-4.8.3-150500.3.9.1
* podmansh-4.8.3-150500.3.9.1
* podman-debuginfo-4.8.3-150500.3.9.1
* Containers Module 15-SP5 (noarch)
* podman-docker-4.8.3-150500.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
1
0
SUSE-SU-2024:1147-1: important: Security update for MozillaThunderbird
by OPENSUSE-UPDATES 08 Apr '24
by OPENSUSE-UPDATES 08 Apr '24
08 Apr '24
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:1147-1
Rating: important
References:
* bsc#1221327
Cross-References:
* CVE-2023-5388
* CVE-2024-0743
* CVE-2024-2605
* CVE-2024-2607
* CVE-2024-2608
* CVE-2024-2610
* CVE-2024-2611
* CVE-2024-2612
* CVE-2024-2614
* CVE-2024-2616
CVSS scores:
* CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-0743 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0743 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2605 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2607 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2608 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2610 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-2611 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2612 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2614 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves 10 vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
* Mozilla Thunderbird 115.9 (bsc#1221327)
* CVE-2024-0743: Crash in NSS TLS method
* CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape
vector
* CVE-2024-2607: JIT code failed to save return registers on Armv7-A
* CVE-2024-2608: Integer overflow could have led to out of bounds write
* CVE-2024-2616: Improve handling of out-of-memory conditions in ICU
* CVE-2023-5388: NSS susceptible to timing attack against RSA decryption
* CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce
leakage
* CVE-2024-2611: Clickjacking vulnerability could have led to a user
accidentally granting permissions
* CVE-2024-2612: Self referencing object could have potentially led to a use-
after-free
* CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9,
and Thunderbird 115.9
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1147=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1147=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1147=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-115.9.0-150200.8.154.1
* MozillaThunderbird-115.9.0-150200.8.154.1
* MozillaThunderbird-debugsource-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-common-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-other-115.9.0-150200.8.154.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-115.9.0-150200.8.154.1
* MozillaThunderbird-115.9.0-150200.8.154.1
* MozillaThunderbird-debugsource-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-common-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-other-115.9.0-150200.8.154.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debuginfo-115.9.0-150200.8.154.1
* MozillaThunderbird-115.9.0-150200.8.154.1
* MozillaThunderbird-debugsource-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-common-115.9.0-150200.8.154.1
* MozillaThunderbird-translations-other-115.9.0-150200.8.154.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5388.html
* https://www.suse.com/security/cve/CVE-2024-0743.html
* https://www.suse.com/security/cve/CVE-2024-2605.html
* https://www.suse.com/security/cve/CVE-2024-2607.html
* https://www.suse.com/security/cve/CVE-2024-2608.html
* https://www.suse.com/security/cve/CVE-2024-2610.html
* https://www.suse.com/security/cve/CVE-2024-2611.html
* https://www.suse.com/security/cve/CVE-2024-2612.html
* https://www.suse.com/security/cve/CVE-2024-2614.html
* https://www.suse.com/security/cve/CVE-2024-2616.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221327
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:1151-1
Rating: moderate
References:
* bsc#1221665
* bsc#1221667
Cross-References:
* CVE-2024-2004
* CVE-2024-2398
CVSS scores:
* CVE-2024-2004 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-2398 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665)
* CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1151=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1151=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1151=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1151=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1151=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1151=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1151=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1151=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1151=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1151=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1151=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1151=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.4 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl-devel-64bit-8.0.1-150400.5.44.1
* libcurl4-64bit-8.0.1-150400.5.44.1
* libcurl4-64bit-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* openSUSE Leap 15.5 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Manager Proxy 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.44.1
* curl-8.0.1-150400.5.44.1
* libcurl4-8.0.1-150400.5.44.1
* libcurl-devel-8.0.1-150400.5.44.1
* curl-debugsource-8.0.1-150400.5.44.1
* curl-debuginfo-8.0.1-150400.5.44.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.44.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2004.html
* https://www.suse.com/security/cve/CVE-2024-2398.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221665
* https://bugzilla.suse.com/show_bug.cgi?id=1221667
1
0
# Security update for xen
Announcement ID: SUSE-SU-2024:1152-1
Rating: moderate
References:
* bsc#1221332
* bsc#1221334
Cross-References:
* CVE-2023-28746
* CVE-2024-2193
CVSS scores:
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-2193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2023-28746: Register File Data Sampling (bsc#1221332)
* CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1152=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1152=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1152=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1152=1
## Package List:
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* xen-debugsource-4.14.6_12-150300.3.69.1
* xen-devel-4.14.6_12-150300.3.69.1
* xen-tools-domU-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-4.14.6_12-150300.3.69.1
* xen-tools-domU-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (x86_64)
* xen-libs-32bit-debuginfo-4.14.6_12-150300.3.69.1
* xen-libs-32bit-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* xen-tools-4.14.6_12-150300.3.69.1
* xen-4.14.6_12-150300.3.69.1
* xen-tools-debuginfo-4.14.6_12-150300.3.69.1
* xen-doc-html-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (noarch)
* xen-tools-xendomains-wait-disk-4.14.6_12-150300.3.69.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* xen-libs-64bit-4.14.6_12-150300.3.69.1
* xen-libs-64bit-debuginfo-4.14.6_12-150300.3.69.1
## References:
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2024-2193.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221332
* https://bugzilla.suse.com/show_bug.cgi?id=1221334
1
0
08 Apr '24
# Security update for python-Pillow
Announcement ID: SUSE-SU-2024:1154-1
Rating: important
References:
* bsc#1222262
Cross-References:
* CVE-2024-28219
CVSS scores:
* CVE-2024-28219 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Pillow fixes the following issues:
* CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1154=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1154=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python-Pillow-debuginfo-7.2.0-150300.3.9.1
* python-Pillow-debugsource-7.2.0-150300.3.9.1
* python3-Pillow-7.2.0-150300.3.9.1
* python3-Pillow-tk-7.2.0-150300.3.9.1
* python3-Pillow-debuginfo-7.2.0-150300.3.9.1
* python3-Pillow-tk-debuginfo-7.2.0-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-Pillow-debuginfo-7.2.0-150300.3.9.1
* python-Pillow-debugsource-7.2.0-150300.3.9.1
* python3-Pillow-7.2.0-150300.3.9.1
* python3-Pillow-tk-7.2.0-150300.3.9.1
* python3-Pillow-debuginfo-7.2.0-150300.3.9.1
* python3-Pillow-tk-debuginfo-7.2.0-150300.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28219.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222262
1
0
SUSE-RU-2024:1155-1: moderate: Recommended update for libgudev and iio-sensor-proxy
by OPENSUSE-UPDATES 08 Apr '24
by OPENSUSE-UPDATES 08 Apr '24
08 Apr '24
# Recommended update for libgudev and iio-sensor-proxy
Announcement ID: SUSE-RU-2024:1155-1
Rating: moderate
References:
* jsc#PED-7503
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that contains one feature can now be installed.
## Description:
This update for libgudev, iio-sensor-proxy fixes the following issue:
* Add iio-sensor-proxy and its dependencies to fix screen rotation.
(jsc#PED-7503)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1155=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1155=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1155=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1155=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1155=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* iio-sensor-proxy-3.3-150300.7.3.1
* libgudev-1_0-devel-237-150300.9.3.1
* libumockdev-preload0-0.16.3-150300.7.3.1
* umockdev-0.16.3-150300.7.3.1
* libgudev-1_0-0-237-150300.9.3.1
* umockdev-debuginfo-0.16.3-150300.7.3.1
* umockdev-devel-0.16.3-150300.7.3.1
* typelib-1_0-GUdev-1_0-237-150300.9.3.1
* umockdev-debugsource-0.16.3-150300.7.3.1
* iio-sensor-proxy-debuginfo-3.3-150300.7.3.1
* libumockdev-preload0-debuginfo-0.16.3-150300.7.3.1
* libumockdev0-0.16.3-150300.7.3.1
* libgudev-debugsource-237-150300.9.3.1
* libumockdev0-debuginfo-0.16.3-150300.7.3.1
* libgudev-1_0-0-debuginfo-237-150300.9.3.1
* iio-sensor-proxy-debugsource-3.3-150300.7.3.1
* typelib-1_0-UMockdev-1_0-0.16.3-150300.7.3.1
* openSUSE Leap 15.3 (noarch)
* iio-sensor-proxy-doc-3.3-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* libgudev-1_0-0-32bit-debuginfo-237-150300.9.3.1
* libgudev-1_0-0-32bit-237-150300.9.3.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libgudev-1_0-0-64bit-237-150300.9.3.1
* libgudev-1_0-0-64bit-debuginfo-237-150300.9.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* iio-sensor-proxy-3.3-150300.7.3.1
* libgudev-1_0-devel-237-150300.9.3.1
* libgudev-1_0-0-237-150300.9.3.1
* typelib-1_0-GUdev-1_0-237-150300.9.3.1
* iio-sensor-proxy-debuginfo-3.3-150300.7.3.1
* libgudev-debugsource-237-150300.9.3.1
* libgudev-1_0-0-debuginfo-237-150300.9.3.1
* iio-sensor-proxy-debugsource-3.3-150300.7.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* iio-sensor-proxy-doc-3.3-150300.7.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* iio-sensor-proxy-3.3-150300.7.3.1
* libgudev-1_0-devel-237-150300.9.3.1
* libgudev-1_0-0-237-150300.9.3.1
* typelib-1_0-GUdev-1_0-237-150300.9.3.1
* iio-sensor-proxy-debuginfo-3.3-150300.7.3.1
* libgudev-debugsource-237-150300.9.3.1
* libgudev-1_0-0-debuginfo-237-150300.9.3.1
* iio-sensor-proxy-debugsource-3.3-150300.7.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* iio-sensor-proxy-doc-3.3-150300.7.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* iio-sensor-proxy-3.3-150300.7.3.1
* libgudev-1_0-devel-237-150300.9.3.1
* libgudev-1_0-0-237-150300.9.3.1
* typelib-1_0-GUdev-1_0-237-150300.9.3.1
* iio-sensor-proxy-debuginfo-3.3-150300.7.3.1
* libgudev-debugsource-237-150300.9.3.1
* libgudev-1_0-0-debuginfo-237-150300.9.3.1
* iio-sensor-proxy-debugsource-3.3-150300.7.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* iio-sensor-proxy-doc-3.3-150300.7.3.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* iio-sensor-proxy-3.3-150300.7.3.1
* libgudev-1_0-devel-237-150300.9.3.1
* libgudev-1_0-0-237-150300.9.3.1
* typelib-1_0-GUdev-1_0-237-150300.9.3.1
* iio-sensor-proxy-debuginfo-3.3-150300.7.3.1
* libgudev-debugsource-237-150300.9.3.1
* libgudev-1_0-0-debuginfo-237-150300.9.3.1
* iio-sensor-proxy-debugsource-3.3-150300.7.3.1
* SUSE Enterprise Storage 7.1 (noarch)
* iio-sensor-proxy-doc-3.3-150300.7.3.1
## References:
* https://jira.suse.com/browse/PED-7503
1
0
08 Apr '24
# Recommended update for rust, rust1.77
Announcement ID: SUSE-RU-2024:1159-1
Rating: moderate
References:
* bsc#1222047
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for rust, rust1.77 fixes the following issues:
Changes in rust1.77:
* update gcc minimum to 13 for SLE (bsc#1222047)
# Version 1.77.0 (2024-03-21)
## Language
* Reveal opaque types within the defining body for exhaustiveness checking.
* Stabilize C-string literals.
* Stabilize THIR unsafeck.
* Add lint `static_mut_refs` to warn on references to mutable statics.
* Support async recursive calls (as long as they have indirection).
* Undeprecate lint `unstable_features` and make use of it in the compiler.
* Make inductive cycles in coherence ambiguous always.
* Get rid of type-driven traversal in const-eval interning only as a [future
compatiblity lint
* Deny braced macro invocations in let-else.
## Compiler
* Include lint `soft_unstable` in future breakage reports.
* Make `i128` and `u128` 16-byte aligned on x86-based targets.
* Use `--verbose` in diagnostic output.
* Improve spacing between printed tokens.
* Merge the `unused_tuple_struct_fields` lint into `dead_code`.
* Error on incorrect implied bounds in well-formedness check with a temporary
exception for Bevy.
* Fix coverage instrumentation/reports for non-ASCII source code.
* Fix `fn`/`const` items implied bounds and well-formedness check.
* Promote `riscv32{im|imafc}-unknown-none-elf` targets to tier 2.
## Libraries
* Implement `From<&[T; N]>` for `Cow<[T]>`.
* Remove special-case handling of `vec.split_off(0)`.
## Stabilized APIs
* `array::each_ref` https://doc.rust-
lang.org/stable/std/primitive.array.html#method.each_ref
* `array::each_mut` https://doc.rust-
lang.org/stable/std/primitive.array.html#method.each_mut
* `core::net` https://doc.rust-lang.org/stable/core/net/index.html
* `f32::round_ties_even` https://doc.rust-
lang.org/stable/std/primitive.f32.html#method.round_ties_even
* `f64::round_ties_even` https://doc.rust-
lang.org/stable/std/primitive.f64.html#method.round_ties_even
* `mem::offset_of!` https://doc.rust-
lang.org/stable/std/mem/macro.offset_of.html
* `slice::first_chunk` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.first_chunk
* `slice::first_chunk_mut` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.first_chunk_mut
* `slice::split_first_chunk` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.split_first_chunk
* `slice::split_first_chunk_mut` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.split_first_chunk_mut
* `slice::last_chunk` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.last_chunk
* `slice::last_chunk_mut` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.last_chunk_mut
* `slice::split_last_chunk` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.split_last_chunk
* `slice::split_last_chunk_mut` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.split_last_chunk_mut
* `slice::chunk_by` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.chunk_by
* `slice::chunk_by_mut` https://doc.rust-
lang.org/stable/std/primitive.slice.html#method.chunk_by_mut
* `Bound::map` https://doc.rust-
lang.org/stable/std/ops/enum.Bound.html#method.map
* `File::create_new` https://doc.rust-
lang.org/stable/std/fs/struct.File.html#method.create_new
* `Mutex::clear_poison` https://doc.rust-
lang.org/stable/std/sync/struct.Mutex.html#method.clear_poison
* `RwLock::clear_poison` https://doc.rust-
lang.org/stable/std/sync/struct.RwLock.html#method.clear_poison
## Cargo
* Extend the build directive syntax with `cargo::`.
* Stabilize metadata `id` format as `PackageIDSpec`.
* Pull out `cargo-util-schemas` as a crate.
* Strip all debuginfo when debuginfo is not requested.
* Inherit jobserver from env for all kinds of runners.
* Deprecate rustc plugin support in cargo.
## Rustdoc
* Allows links in markdown headings.
* Search for tuples and unit by type with `()`.
* Clean up the source sidebar's hide button.
* Prevent JS injection from `localStorage`.
## Misc
* Recommend version-sorting for all sorting in style guide.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1159=1 openSUSE-SLE-15.5-2024-1159=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1159=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* cargo1.77-1.77.0-150500.11.3.1
* rust1.77-debuginfo-1.77.0-150500.11.3.1
* cargo-1.77.0-150500.27.9.1
* cargo1.77-debuginfo-1.77.0-150500.11.3.1
* rust-1.77.0-150500.27.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586 nosrc)
* rust1.77-1.77.0-150500.11.3.1
* openSUSE Leap 15.5 (nosrc)
* rust1.77-test-1.77.0-150500.11.3.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cargo1.77-1.77.0-150500.11.3.1
* rust1.77-debuginfo-1.77.0-150500.11.3.1
* cargo-1.77.0-150500.27.9.1
* cargo1.77-debuginfo-1.77.0-150500.11.3.1
* rust-1.77.0-150500.27.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.77-1.77.0-150500.11.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222047
1
0
08 Apr '24
# Security update for python310
Announcement ID: SUSE-SU-2024:1162-1
Rating: important
References:
* bsc#1189495
* bsc#1211301
* bsc#1219559
* bsc#1219666
* bsc#1221854
Cross-References:
* CVE-2023-52425
* CVE-2023-6597
* CVE-2024-0450
CVSS scores:
* CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6597 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves three vulnerabilities and has two security fixes can now
be installed.
## Description:
This update for python310 fixes the following issues:
* CVE-2024-0450: Fixed "quoted-overlap" in zipfile module is python310
(bsc#1221854)
* CVE-2023-52425: Fixed denial of service caused by processing large tokens in
expat module in python310 (bsc#1219559)
* CVE-2023-6597: Fixed tempfile.TemporaryDirectory fails on removing dir in
some edge cases related to symlinks in python310 (bsc#1219666)
Other changes:
* Revert %autopatch due to missing parameter support (bsc#1189495)
* Extended crypto-policies support (bsc#1211301)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1162=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1162=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1162=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1162=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1162=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1162=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1162=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python310-devel-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-doc-devhelp-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* python310-testsuite-debuginfo-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-testsuite-3.10.14-150400.4.45.1
* python310-doc-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* openSUSE Leap 15.4 (x86_64)
* python310-32bit-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-32bit-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-32bit-3.10.14-150400.4.45.1
* python310-32bit-3.10.14-150400.4.45.1
* python310-base-32bit-3.10.14-150400.4.45.1
* python310-base-32bit-debuginfo-3.10.14-150400.4.45.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* python310-base-64bit-3.10.14-150400.4.45.1
* python310-base-64bit-debuginfo-3.10.14-150400.4.45.1
* python310-64bit-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-64bit-debuginfo-3.10.14-150400.4.45.1
* python310-64bit-3.10.14-150400.4.45.1
* libpython3_10-1_0-64bit-3.10.14-150400.4.45.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python310-devel-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-doc-devhelp-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* python310-testsuite-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-doc-3.10.14-150400.4.45.1
* python310-testsuite-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* openSUSE Leap 15.5 (x86_64)
* python310-32bit-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-32bit-debuginfo-3.10.14-150400.4.45.1
* libpython3_10-1_0-32bit-3.10.14-150400.4.45.1
* python310-32bit-3.10.14-150400.4.45.1
* python310-base-32bit-3.10.14-150400.4.45.1
* python310-base-32bit-debuginfo-3.10.14-150400.4.45.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python310-devel-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python310-devel-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python310-devel-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python310-devel-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python310-devel-3.10.14-150400.4.45.1
* libpython3_10-1_0-debuginfo-3.10.14-150400.4.45.1
* python310-debugsource-3.10.14-150400.4.45.1
* libpython3_10-1_0-3.10.14-150400.4.45.1
* python310-curses-3.10.14-150400.4.45.1
* python310-dbm-debuginfo-3.10.14-150400.4.45.1
* python310-idle-3.10.14-150400.4.45.1
* python310-3.10.14-150400.4.45.1
* python310-core-debugsource-3.10.14-150400.4.45.1
* python310-dbm-3.10.14-150400.4.45.1
* python310-tools-3.10.14-150400.4.45.1
* python310-base-3.10.14-150400.4.45.1
* python310-tk-3.10.14-150400.4.45.1
* python310-tk-debuginfo-3.10.14-150400.4.45.1
* python310-curses-debuginfo-3.10.14-150400.4.45.1
* python310-debuginfo-3.10.14-150400.4.45.1
* python310-base-debuginfo-3.10.14-150400.4.45.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52425.html
* https://www.suse.com/security/cve/CVE-2023-6597.html
* https://www.suse.com/security/cve/CVE-2024-0450.html
* https://bugzilla.suse.com/show_bug.cgi?id=1189495
* https://bugzilla.suse.com/show_bug.cgi?id=1211301
* https://bugzilla.suse.com/show_bug.cgi?id=1219559
* https://bugzilla.suse.com/show_bug.cgi?id=1219666
* https://bugzilla.suse.com/show_bug.cgi?id=1221854
1
0
08 Apr '24
# Recommended update for wicked
Announcement ID: SUSE-RU-2024:1126-1
Rating: important
References:
* bsc#1220996
* bsc#1221194
* bsc#1221358
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has three fixes can now be installed.
## Description:
This update for wicked fixes the following issues:
* Fix fallback-lease drop in addrconf (bsc#1220996)
* Use upstream `nvme nbft show` (bsc#1221358)
* Hide secrets in debug log (bsc#1221194)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1126=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1126=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1126=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1126=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1126=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1126=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1126=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1126=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150300.4.21.1
* wicked-0.6.74-150300.4.21.1
* wicked-service-0.6.74-150300.4.21.1
* wicked-debuginfo-0.6.74-150300.4.21.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220996
* https://bugzilla.suse.com/show_bug.cgi?id=1221194
* https://bugzilla.suse.com/show_bug.cgi?id=1221358
1
0
08 Apr '24
# Recommended update for wicked
Announcement ID: SUSE-RU-2024:1127-1
Rating: important
References:
* bsc#1220996
* bsc#1221194
* bsc#1221358
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has three fixes can now be installed.
## Description:
This update for wicked fixes the following issues:
* Fix fallback-lease drop in addrconf (bsc#1220996)
* Use upstream `nvme nbft show` (bsc#1221358)
* Hide secrets in debug log (bsc#1221194)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1127=1 openSUSE-SLE-15.5-2024-1127=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1127=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1127=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* wicked-debuginfo-0.6.74-150500.3.18.1
* wicked-nbft-0.6.74-150500.3.18.1
* wicked-service-0.6.74-150500.3.18.1
* wicked-0.6.74-150500.3.18.1
* wicked-debugsource-0.6.74-150500.3.18.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* wicked-debugsource-0.6.74-150500.3.18.1
* wicked-service-0.6.74-150500.3.18.1
* wicked-debuginfo-0.6.74-150500.3.18.1
* wicked-0.6.74-150500.3.18.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wicked-debuginfo-0.6.74-150500.3.18.1
* wicked-nbft-0.6.74-150500.3.18.1
* wicked-service-0.6.74-150500.3.18.1
* wicked-0.6.74-150500.3.18.1
* wicked-debugsource-0.6.74-150500.3.18.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220996
* https://bugzilla.suse.com/show_bug.cgi?id=1221194
* https://bugzilla.suse.com/show_bug.cgi?id=1221358
1
0
# Security update for expat
Announcement ID: SUSE-SU-2024:1129-1
Rating: important
References:
* bsc#1219559
* bsc#1221289
Cross-References:
* CVE-2023-52425
* CVE-2024-28757
CVSS scores:
* CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for expat fixes the following issues:
* CVE-2023-52425: Fixed a DoS caused by processing large tokens. (bsc#1219559)
* CVE-2024-28757: Fixed an XML Entity Expansion. (bsc#1221289)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1129=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1129=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1129=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1129=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1129=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1129=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1129=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1129=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1129=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1129=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1129=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1129=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1129=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1129=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1129=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1129=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1129=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1129=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexpat1-64bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-64bit-2.4.4-150400.3.17.1
* libexpat1-64bit-2.4.4-150400.3.17.1
* expat-64bit-debuginfo-2.4.4-150400.3.17.1
* openSUSE Leap 15.4 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.17.1
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* openSUSE Leap 15.5 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.17.1
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* Basesystem Module 15-SP5 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* SUSE Manager Proxy 4.3 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libexpat1-2.4.4-150400.3.17.1
* expat-2.4.4-150400.3.17.1
* libexpat1-debuginfo-2.4.4-150400.3.17.1
* expat-debugsource-2.4.4-150400.3.17.1
* expat-debuginfo-2.4.4-150400.3.17.1
* libexpat-devel-2.4.4-150400.3.17.1
* SUSE Manager Server 4.3 (x86_64)
* expat-32bit-debuginfo-2.4.4-150400.3.17.1
* libexpat1-32bit-2.4.4-150400.3.17.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52425.html
* https://www.suse.com/security/cve/CVE-2024-28757.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219559
* https://bugzilla.suse.com/show_bug.cgi?id=1221289
1
0
openSUSE-RU-2024:0103-1: moderate: Recommended update for gscan2pdf, perl-Gtk3-SimpleList
by maintenance@opensuse.org 07 Apr '24
by maintenance@opensuse.org 07 Apr '24
07 Apr '24
openSUSE Recommended Update: Recommended update for gscan2pdf, perl-Gtk3-SimpleList
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0103-1
Rating: moderate
References: #1021886 #1185787 #844227
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has three recommended fixes can now be
installed.
Description:
This update for gscan2pdf, perl-Gtk3-SimpleList fixes the following issues:
Introducing gscan2pdf version 2.13.2 and it's dependency
perl-Gtk3-SimpleList to Leap.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-103=1
Package List:
- openSUSE Backports SLE-15-SP5 (noarch):
gscan2pdf-2.13.2-bp155.2.1
gscan2pdf-lang-2.13.2-bp155.2.1
perl-Gtk3-SimpleList-0.21-bp155.2.1
References:
https://bugzilla.suse.com/1021886
https://bugzilla.suse.com/1185787
https://bugzilla.suse.com/844227
1
0
openSUSE-RU-2024:0104-1: moderate: Recommended update for virtualbox
by maintenance@opensuse.org 07 Apr '24
by maintenance@opensuse.org 07 Apr '24
07 Apr '24
openSUSE Recommended Update: Recommended update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0104-1
Rating: moderate
References: #1221496
Affected Products:
openSUSE Leap 15.5
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for virtualbox fixes the following issues:
- The location of vboxconfig was wrong. Some errors in vboxdrv.sh are
fixed.
- Further fixes for builds on Leap 15.6. (boo#1221496)
- Fix build on Leap 15.6.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.5:
zypper in -t patch openSUSE-2024-104=1
Package List:
- openSUSE Leap 15.5 (x86_64):
python3-virtualbox-7.0.14-lp155.2.19.1
python3-virtualbox-debuginfo-7.0.14-lp155.2.19.1
virtualbox-7.0.14-lp155.2.19.1
virtualbox-debuginfo-7.0.14-lp155.2.19.1
virtualbox-debugsource-7.0.14-lp155.2.19.1
virtualbox-devel-7.0.14-lp155.2.19.1
virtualbox-guest-tools-7.0.14-lp155.2.19.1
virtualbox-guest-tools-debuginfo-7.0.14-lp155.2.19.1
virtualbox-kmp-debugsource-7.0.14-lp155.2.19.1
virtualbox-kmp-default-7.0.14_k5.14.21_150500.55.52-lp155.2.19.1
virtualbox-kmp-default-debuginfo-7.0.14_k5.14.21_150500.55.52-lp155.2.19.1
virtualbox-qt-7.0.14-lp155.2.19.1
virtualbox-qt-debuginfo-7.0.14-lp155.2.19.1
virtualbox-vnc-7.0.14-lp155.2.19.1
virtualbox-websrv-7.0.14-lp155.2.19.1
virtualbox-websrv-debuginfo-7.0.14-lp155.2.19.1
- openSUSE Leap 15.5 (noarch):
virtualbox-guest-desktop-icons-7.0.14-lp155.2.19.1
virtualbox-guest-source-7.0.14-lp155.2.19.1
virtualbox-host-source-7.0.14-lp155.2.19.1
References:
https://bugzilla.suse.com/1221496
1
0
05 Apr '24
# Security update for go1.22
Announcement ID: SUSE-SU-2024:1121-1
Rating: important
References:
* bsc#1218424
* bsc#1221400
Cross-References:
* CVE-2023-45288
CVSS scores:
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for go1.22 fixes the following issues:
* CVE-2023-45288: Fixed denial of service via HTTP/2 continuation frames
(bsc#1221400)
Other changes:
\- go minor release upgrade to 1.22.2 (bsc#1218424)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1121=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1121=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.2-150000.1.12.1
* go1.22-1.22.2-150000.1.12.1
* go1.22-race-1.22.2-150000.1.12.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.2-150000.1.12.1
* go1.22-1.22.2-150000.1.12.1
* go1.22-race-1.22.2-150000.1.12.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
* https://bugzilla.suse.com/show_bug.cgi?id=1221400
1
0
SUSE-SU-2024:1119-1: important: Security update for gradle, gradle-bootstrap
by OPENSUSE-UPDATES 05 Apr '24
by OPENSUSE-UPDATES 05 Apr '24
05 Apr '24
# Security update for gradle, gradle-bootstrap
Announcement ID: SUSE-SU-2024:1119-1
Rating: important
References:
* bsc#1145903
* bsc#1184799
Cross-References:
* CVE-2019-15052
* CVE-2021-29429
CVSS scores:
* CVE-2019-15052 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2019-15052 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-29429 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-29429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for gradle, gradle-bootstrap fixes the following issues:
* CVE-2021-29429: Fixed information disclosure through temporary directory
permissions (bsc#1184799).
* CVE-2019-15052: Fixed authentication credentials disclosure (bsc#1145903).
gradle:
* Fixed RPM package building issues due to changed dependencies
gradle-bootstrap:
* Added missing dependency of aopalliance
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1119=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1119=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1119=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1119=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1119=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1119=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1119=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1119=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1119=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1119=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1119=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1119=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1119=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1119=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* gradle-4.4.1-150200.3.15.1
* openSUSE Leap 15.5 (noarch)
* groovy-bootstrap-2.4.21-150200.3.9.1
* gpars-bootstrap-1.2.1-150200.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.15.1
* gradle-bootstrap-4.4.1-150200.3.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* gradle-4.4.1-150200.3.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gradle-4.4.1-150200.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2019-15052.html
* https://www.suse.com/security/cve/CVE-2021-29429.html
* https://bugzilla.suse.com/show_bug.cgi?id=1145903
* https://bugzilla.suse.com/show_bug.cgi?id=1184799
1
0
04 Apr '24
# Recommended update for tomcat10
Announcement ID: SUSE-RU-2024:1112-1
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that can now be installed.
## Description:
This update for tomcat10 fixes the following issues:
* Add missing Requires(post): util-linux to have runuser into post
* Add %%systemd_ordering to packages with systemd unit files, so that the
order is the right one if those packages find themselves in the same
transaction with systemd
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1112=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1112=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* tomcat10-jsp-3_1-api-10.1.18-150200.5.17.1
* tomcat10-jsvc-10.1.18-150200.5.17.1
* tomcat10-webapps-10.1.18-150200.5.17.1
* tomcat10-embed-10.1.18-150200.5.17.1
* tomcat10-10.1.18-150200.5.17.1
* tomcat10-docs-webapp-10.1.18-150200.5.17.1
* tomcat10-lib-10.1.18-150200.5.17.1
* tomcat10-admin-webapps-10.1.18-150200.5.17.1
* tomcat10-servlet-6_0-api-10.1.18-150200.5.17.1
* tomcat10-el-5_0-api-10.1.18-150200.5.17.1
* Web and Scripting Module 15-SP5 (noarch)
* tomcat10-jsp-3_1-api-10.1.18-150200.5.17.1
* tomcat10-webapps-10.1.18-150200.5.17.1
* tomcat10-10.1.18-150200.5.17.1
* tomcat10-lib-10.1.18-150200.5.17.1
* tomcat10-admin-webapps-10.1.18-150200.5.17.1
* tomcat10-servlet-6_0-api-10.1.18-150200.5.17.1
* tomcat10-el-5_0-api-10.1.18-150200.5.17.1
1
0
# Security update for squid
Announcement ID: SUSE-SU-2024:1113-1
Rating: important
References:
* bsc#1216715
* bsc#1219960
Cross-References:
* CVE-2024-25111
* CVE-2024-25617
CVSS scores:
* CVE-2024-25111 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25617 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for squid fixes the following issues:
* CVE-2024-25617: Fixes denial of service in HTTP header parser (bsc#1219960)
* CVE-2024-25111: Fixes Chunked Encoding Stack Overflow (bsc#1216715)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1113=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1113=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1113=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1113=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1113=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1113=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1113=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1113=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1113=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1113=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Manager Proxy 4.3 (x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* squid-5.7-150400.3.26.1
* squid-debugsource-5.7-150400.3.26.1
* squid-debuginfo-5.7-150400.3.26.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25111.html
* https://www.suse.com/security/cve/CVE-2024-25617.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216715
* https://bugzilla.suse.com/show_bug.cgi?id=1219960
1
0
SUSE-RU-2024:1116-1: moderate: Recommended update for google-cloud-sap-agent
by OPENSUSE-UPDATES 04 Apr '24
by OPENSUSE-UPDATES 04 Apr '24
04 Apr '24
# Recommended update for google-cloud-sap-agent
Announcement ID: SUSE-RU-2024:1116-1
Rating: moderate
References:
* bsc#1220010
* bsc#1220111
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for google-cloud-sap-agent fixes the following issues:
* google-cloud-sap-agent was updated from version 3.0 to version 3.1
(bsc#1220010, bsc#1220111):
* Fixing system replication status code being returned
* Reduce disk snapshot wait durations
* Fix test flakes in workloadcollector test.
* adding metrics for db freeze time and total workflow time
* Fix for SAP System discovery adding the current host to all components.
* Restore default WLM metric collection settings.
* change description of validate OTE
* fix a typo in the command name and add a delay before we try the unmount
* Use underscore as separator for flags in place of hyphens
* Enable host_metrics and disable reliability_metrics by default in configure
OTE
* Collect reliability metrics in the free namespace
* Remove user from cmd params for HANA Replication
* Enable workload manager metric collection by default.
* Add support configuration flag to enable legacy WLM metric data submission
workflow.
* Lowers the log level of discovery to info
* Fix for HANA Replication Config
* Add additional instance-id parameter for users who do not want to provide
port number
* Use _ instead of - for parameters in configurebackint
* Implementing panic recovery to HANA Monitoring: CreateWorkerPool
* Fix issue with process metrics subroutine starting.
* Add a flag to enable or disable workload discovery.
* Reduce logs in sapdiscovery to debug, these are now run a lot more
frequently and are flooding the logs
* Use bucket `cloudsapdeploystaging` for staging environment.
* Updates default value handling for system discovery flag.
* Added default values to some frequency flags in configure OTE
* force a sync before unmounting to clear out stale file handles
* Retain recoverable routine in process metrics.
* Ensures slow metrics workers stop on context cancellation.
* Log lsof output if unmount fails during restore
* SAP Discovery - Discover R3trans data
* Add panic recovery to collectiondefinition update routine
* configurebackint OTE.
* Adding panic recovery to remote.go
* Prevent host metrics from restarting the daily metrics report if it has
already been started.
* Add panic recovery to agent metrics
* Implementing panic recovery for hana monitoring: logging action daily
* Routines now use their own context and cancel in the event of a panic
recovery.
* Add panic recovery to host metrics routines
* Removed -path flag and fixed usage string
* Add workload properties to the SAP System definition.
* Add panic recovery to collectMetricsFromConfig routines.
* Add panic recovery to fast metric collection routine.
* Reduces the log severity to debug for the exponential backoff policy
* Add panic recovery to heartbeat routine.
* Updating configuration.json file to remove deprecated sap_discovery field
* Use protojson instead of custom function for snake_case marshaling
* Add panic recovery to WLM metrics collection
* HANA Insights rules tranche 11: Create unit tests and add to auto push
* Add panic recovery to workload collector daily usage metrics.
* Processmetrics - suppress Error and Warn logs that really need to be debug
* Formatting the output of messages printed by configure OTE
* Changing flag names of configure OTE to align better with configuration.json
fields
* Add automatic panic recovery to slow metrics collection
* Add panic recovery to goroutine collectAndSend
* Add panic recovery to goroutine
* Retain recoverable routines beyond function scope.
* Implement recovery handler for SAP System discovery package
* Tranche 11: HRE Rules
* Update github build
* Adds generic panic recovery to SAP System discovery package
* Initialize the sidadm env to ensure restore can be run as root user
* not pacaking gcbdr scripts till launch of the feature
* Change datatype of frequency flags from string to int
* Breaking down --frequency flag into separate flags for different features
for better isolation
* Fix configuration.json file from being written in camelCase to snake_case
* Tranche 6,7,8,9,10: HRE Rules
* Suppress pacemaker related log from Error to Debug
* creating the OTE for GCBDR discovery
* Update HA node identification
* Tranche 10: HRE Rules
* Update file permissions and ownership for installbackint when running as
root.
* Adding newline after version print.
* Exposing HANA Logical volumes availability metrics
* Make workloadmanager parameters test more robust.
* Fix panic in cloud discovery
* Tranche 10: HRE Rules
* Add recovery_folder_prefix parameter to Backint.
* Mark process_metrics_send_frequency as deprecated
* Add snapshot-type param to hanadiskbackup with default as STANDARD type.
Users can override to ARCHIVE type if needed.
* Add new folder_prefix parameter to Backint.
* Add HANA new HANA insight rules to BUILD file and embed sources
* Tranche 10a: HRE Rules
* Tranche 6b: HRE Rules
* Tranche 8b: HRE Rules
* Fix for sending isABAP value
* Updating logusage command line flags
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1116=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1116=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1116=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1116=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1116=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.1-150100.3.26.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.1-150100.3.26.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.1-150100.3.26.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.1-150100.3.26.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* google-cloud-sap-agent-3.1-150100.3.26.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220010
* https://bugzilla.suse.com/show_bug.cgi?id=1220111
1
0
04 Apr '24
# Recommended update for yast2-s390
Announcement ID: SUSE-RU-2024:1108-1
Rating: moderate
References:
* bsc#1220995
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for yast2-s390 fixes the following issue:
* Replace 'mkinitrd' with dracut (bsc#1220995)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1108=1 openSUSE-SLE-15.5-2024-1108=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1108=1
## Package List:
* openSUSE Leap 15.5 (s390x)
* yast2-s390-4.5.4-150500.3.6.3
* Basesystem Module 15-SP5 (s390x)
* yast2-s390-4.5.4-150500.3.6.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220995
1
0
SUSE-SU-2024:1097-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
by OPENSUSE-UPDATES 03 Apr '24
by OPENSUSE-UPDATES 03 Apr '24
03 Apr '24
# Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:1097-1
Rating: important
References:
* bsc#1208911
* bsc#1215887
* bsc#1216898
* bsc#1218487
* bsc#1218610
Cross-References:
* CVE-2023-0461
* CVE-2023-39191
* CVE-2023-46813
* CVE-2023-51779
* CVE-2023-6531
CVSS scores:
* CVE-2023-0461 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-0461 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-39191 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-39191 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-46813 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-46813 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves five vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_11 fixes several issues.
The following security issues were fixed:
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic()on
the socket that the SKB is queued on (bsc#1218487).
* CVE-2023-46813: Fixed a local privilege escalation with user-space programs
that have access to MMIO regions (bsc#1216898).
* CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-
supplied eBPF programs that may have allowed an attacker with CAP_BPF
privileges to escalate privileges and execute arbitrary code. (bsc#1215863)
* CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race
condition in bt_sock_recvmsg (bsc#1218610).
* CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208911).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1097=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1097=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* kernel-livepatch-5_14_21-150500_11-rt-9-150500.6.2
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-9-150500.6.2
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-9-150500.6.2
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_11-rt-9-150500.6.2
* kernel-livepatch-5_14_21-150500_11-rt-debuginfo-9-150500.6.2
* kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-9-150500.6.2
## References:
* https://www.suse.com/security/cve/CVE-2023-0461.html
* https://www.suse.com/security/cve/CVE-2023-39191.html
* https://www.suse.com/security/cve/CVE-2023-46813.html
* https://www.suse.com/security/cve/CVE-2023-51779.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://bugzilla.suse.com/show_bug.cgi?id=1208911
* https://bugzilla.suse.com/show_bug.cgi?id=1215887
* https://bugzilla.suse.com/show_bug.cgi?id=1216898
* https://bugzilla.suse.com/show_bug.cgi?id=1218487
* https://bugzilla.suse.com/show_bug.cgi?id=1218610
1
0
openSUSE-RU-2024:0100-1: moderate: Recommended update for keepassxc
by maintenance@opensuse.org 03 Apr '24
by maintenance@opensuse.org 03 Apr '24
03 Apr '24
openSUSE Recommended Update: Recommended update for keepassxc
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0100-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for keepassxc fixes the following issues:
Update to 2.7.7:
* Changes
- Support USB Hotplug for Hardware Key interface [#10092]
- Support 1PUX and Bitwarden import [#9815]
- Browser: Add support for PassKeys [#8825, #9987, #10318]
- Build System: Move to vcpkg manifest mode [#10088]
* Fixes
- Fix multiple TOTP issues [#9874]
- Fix focus loss on save when the editor is not visible anymore [#10075]
- Fix visual when removing entry from history [#9947]
- Fix first entry is not selected when a search is performed [#9868]
- Prevent scrollbars on entry drag/drop [#9747]
- Prevent duplicate characters in "Also choose from" field of password
generator [#9803]
- Security: Prevent byte-by-byte and attachment inference side channel
attacks [#10266]
- Browser: Fix raising Update Entry messagebox [#9853]
- Browser: Fix bugs when returning credentials [#9136]
- Browser: Fix crash on database open from browser [#9939]
- Browser: Fix support for referenced URL fields [#8788]
- MacOS: Fix crash when changing highlight/accent color [#10348]
- MacOS: Fix TouchID appearing even though lid is closed [#10092]
- Windows: Fix terminating KeePassXC processes with MSI installer [#9822]
- FdoSecrets: Fix database merge crash when enabled [#10136]
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-100=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le s390x x86_64):
keepassxc-2.7.7-bp155.2.6.1
- openSUSE Backports SLE-15-SP5 (noarch):
keepassxc-lang-2.7.7-bp155.2.6.1
References:
1
0
openSUSE-RU-2024:0102-1: moderate: Recommended update for kanidm
by maintenance@opensuse.org 03 Apr '24
by maintenance@opensuse.org 03 Apr '24
03 Apr '24
openSUSE Recommended Update: Recommended update for kanidm
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0102-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for kanidm fixes the following issues:
Update to version 1.1.0~rc16~git7.8a1b7b5:
* Require kanidm-unixd before kanidm-unixd-tasks (#2687)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-102=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
kanidm-1.1.0~rc16~git7.8a1b7b5-bp155.17.1
kanidm-clients-1.1.0~rc16~git7.8a1b7b5-bp155.17.1
kanidm-docs-1.1.0~rc16~git7.8a1b7b5-bp155.17.1
kanidm-server-1.1.0~rc16~git7.8a1b7b5-bp155.17.1
kanidm-unixd-clients-1.1.0~rc16~git7.8a1b7b5-bp155.17.1
References:
1
0
openSUSE-RU-2024:0099-1: important: Recommended update for seamonkey
by maintenance@opensuse.org 02 Apr '24
by maintenance@opensuse.org 02 Apr '24
02 Apr '24
openSUSE Recommended Update: Recommended update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0099-1
Rating: important
References: #1219739
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for seamonkey fixes the following issues:
Update to SeaMonkey 2.53.18.2
* Block set-cookie from multipart/x-mixed-replace with pref bug 1864385.
* Check if WorkerRunnable::Run runs on top of
WorkerThreadPrimaryRunnable::Run in a worker thread bug 1867982.
* Process pairs in coord list in PolyArea bug 1878211.
* Cherry-pick update to dav1d bug 1881093.
* Land NSS NSS_3_90_2_RTM UPGRADE_NSS_RELEASE bug 1880562.
* Fix DSN for send later bug 815638.
* Catch webNavigation error during tab restore bug 1885748.
* SeaMonkey 2.53.18.2 uses the same backend as Firefox and contains the
relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.18.2 shares most parts of the mail and news code with
Thunderbird. Please read the Thunderbird 60.8.0 release notes for
specific security fixes in this release.
* Additional important security fixes up to Current Firefox 115.9 and
Thunderbird 115.9 ESR plus many enhancements have been backported. We
will continue to enhance SeaMonkey security in subsequent 2.53.x beta
and release versions as fast as we are able to.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-99=1
Package List:
- openSUSE Backports SLE-15-SP5 (i586 x86_64):
seamonkey-2.53.18.2-bp155.2.18.1
seamonkey-dom-inspector-2.53.18.2-bp155.2.18.1
seamonkey-irc-2.53.18.2-bp155.2.18.1
References:
https://bugzilla.suse.com/1219739
1
0
SUSE-RU-2024:1085-1: moderate: Recommended update for cloud-netconfig
by OPENSUSE-UPDATES 02 Apr '24
by OPENSUSE-UPDATES 02 Apr '24
02 Apr '24
# Recommended update for cloud-netconfig
Announcement ID: SUSE-RU-2024:1085-1
Rating: moderate
References:
* bsc#1221757
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for cloud-netconfig fixes the following issues:
* Update to version 1.14
* Use '-s' instead of '\--no-progress-meter' for curl (bsc#1221757)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1085=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1085=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1085=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1085=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1085=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1085=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1085=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1085=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1085=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1085=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1085=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1085=1
## Package List:
* openSUSE Leap Micro 5.3 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* openSUSE Leap Micro 5.4 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* openSUSE Leap 15.5 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* Public Cloud Module 15-SP2 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* Public Cloud Module 15-SP3 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* Public Cloud Module 15-SP4 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
* Public Cloud Module 15-SP5 (noarch)
* cloud-netconfig-gce-1.14-150000.25.23.1
* cloud-netconfig-ec2-1.14-150000.25.23.1
* cloud-netconfig-azure-1.14-150000.25.23.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221757
1
0
02 Apr '24
# Security update for perl-DBD-SQLite
Announcement ID: SUSE-SU-2024:1086-1
Rating: moderate
References:
* bsc#1218946
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one security fix can now be installed.
## Description:
This update for perl-DBD-SQLite fixes the following issues:
* rebuild against current system sqlite. (bsc#1218946)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1086=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1086=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1086=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* perl-DBD-SQLite-1.66-150300.3.9.1
* perl-DBD-SQLite-debuginfo-1.66-150300.3.9.1
* perl-DBD-SQLite-debugsource-1.66-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* perl-DBD-SQLite-1.66-150300.3.9.1
* perl-DBD-SQLite-debuginfo-1.66-150300.3.9.1
* perl-DBD-SQLite-debugsource-1.66-150300.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* perl-DBD-SQLite-1.66-150300.3.9.1
* perl-DBD-SQLite-debuginfo-1.66-150300.3.9.1
* perl-DBD-SQLite-debugsource-1.66-150300.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218946
1
0
02 Apr '24
# Recommended update for xterm
Announcement ID: SUSE-RU-2024:1089-1
Rating: moderate
References:
* bsc#1220585
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for xterm fixes the following issues:
* A bug in the parser for several escape sequences causes the first character
following the sequence to be ignored (bsc#1220585). Patch backported from
version 335n.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1089=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1089=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* xterm-bin-debuginfo-330-150200.11.15.1
* xterm-bin-330-150200.11.15.1
* xterm-debugsource-330-150200.11.15.1
* xterm-330-150200.11.15.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xterm-bin-debuginfo-330-150200.11.15.1
* xterm-bin-330-150200.11.15.1
* xterm-debugsource-330-150200.11.15.1
* xterm-330-150200.11.15.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1220585
1
0
SUSE-SU-2024:1079-1: important: Security update for netty, netty-tcnative
by OPENSUSE-UPDATES 02 Apr '24
by OPENSUSE-UPDATES 02 Apr '24
02 Apr '24
# Security update for netty, netty-tcnative
Announcement ID: SUSE-SU-2024:1079-1
Rating: important
References:
* bsc#1222045
Cross-References:
* CVE-2024-29025
CVSS scores:
* CVE-2024-29025 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for netty, netty-tcnative fixes the following issues:
* CVE-2024-29025: Fixed out of memory due to large number of form fields
(bsc#1222045).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1079=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1079=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1079=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1079=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1079=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1079=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1079=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1079=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1079=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1079=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1079=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1079=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1079=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1079=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1079=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* netty-4.1.108-150200.4.23.1
* openSUSE Leap 15.5 (noarch)
* netty-javadoc-4.1.108-150200.4.23.1
* netty-poms-4.1.108-150200.4.23.1
* netty-tcnative-javadoc-2.0.65-150200.3.19.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* netty-4.1.108-150200.4.23.1
* SUSE Package Hub 15 15-SP5 (noarch)
* netty-javadoc-4.1.108-150200.4.23.1
* netty-poms-4.1.108-150200.4.23.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* netty-tcnative-2.0.65-150200.3.19.1
## References:
* https://www.suse.com/security/cve/CVE-2024-29025.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222045
1
0
02 Apr '24
# Recommended update for xfsprogs-scrub
Announcement ID: SUSE-RU-2024:1080-1
Rating: low
References:
* bsc#1190495
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for xfsprogs-scrub fixes the following issues:
* Added missing xfsprogs-scrub to Package Hub for SLE-15-SP5 and SLE-15-SP4
(bsc#1190495)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1080=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1080=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1080=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1080=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1080=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1080=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1080=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1080=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1080=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1080=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libhandle1-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* libhandle1-5.13.0-150400.3.5.1
* xfsprogs-scrub-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-devel-5.13.0-150400.3.5.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libhandle1-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* libhandle1-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-devel-5.13.0-150400.3.5.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libhandle1-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* libhandle1-5.13.0-150400.3.5.1
* xfsprogs-scrub-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-devel-5.13.0-150400.3.5.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* xfsprogs-debuginfo-5.13.0-150400.3.5.1
* xfsprogs-5.13.0-150400.3.5.1
* xfsprogs-debugsource-5.13.0-150400.3.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1190495
1
0
02 Apr '24
# Recommended update for bluez
Announcement ID: SUSE-RU-2024:1082-1
Rating: moderate
References:
* bsc#1209153
* bsc#1220329
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for bluez fixes the following issues:
* Add necessary Supplements (gnome-bluetooth, blueman, bluedevil5) to bluez-
obexd, so that file transfer features of the applications can be used by
default (bsc#1209153, bsc#1220329).
* Update the description of bluez-obexd
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1082=1 openSUSE-SLE-15.5-2024-1082=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1082=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1082=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1082=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1082=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* bluez-cups-5.65-150500.3.11.1
* bluez-debugsource-5.65-150500.3.11.1
* bluez-5.65-150500.3.11.1
* bluez-devel-5.65-150500.3.11.1
* bluez-obexd-debuginfo-5.65-150500.3.11.1
* bluez-test-debuginfo-5.65-150500.3.11.1
* libbluetooth3-5.65-150500.3.11.1
* bluez-test-5.65-150500.3.11.1
* bluez-obexd-5.65-150500.3.11.1
* libbluetooth3-debuginfo-5.65-150500.3.11.1
* bluez-deprecated-debuginfo-5.65-150500.3.11.1
* bluez-deprecated-5.65-150500.3.11.1
* bluez-cups-debuginfo-5.65-150500.3.11.1
* bluez-debuginfo-5.65-150500.3.11.1
* openSUSE Leap 15.5 (noarch)
* bluez-zsh-completion-5.65-150500.3.11.1
* bluez-auto-enable-devices-5.65-150500.3.11.1
* openSUSE Leap 15.5 (x86_64)
* bluez-devel-32bit-5.65-150500.3.11.1
* libbluetooth3-32bit-debuginfo-5.65-150500.3.11.1
* libbluetooth3-32bit-5.65-150500.3.11.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libbluetooth3-64bit-5.65-150500.3.11.1
* bluez-devel-64bit-5.65-150500.3.11.1
* libbluetooth3-64bit-debuginfo-5.65-150500.3.11.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libbluetooth3-debuginfo-5.65-150500.3.11.1
* libbluetooth3-5.65-150500.3.11.1
* bluez-debuginfo-5.65-150500.3.11.1
* bluez-debugsource-5.65-150500.3.11.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bluez-debugsource-5.65-150500.3.11.1
* bluez-5.65-150500.3.11.1
* libbluetooth3-5.65-150500.3.11.1
* libbluetooth3-debuginfo-5.65-150500.3.11.1
* bluez-deprecated-debuginfo-5.65-150500.3.11.1
* bluez-deprecated-5.65-150500.3.11.1
* bluez-debuginfo-5.65-150500.3.11.1
* Basesystem Module 15-SP5 (noarch)
* bluez-zsh-completion-5.65-150500.3.11.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bluez-devel-5.65-150500.3.11.1
* bluez-debuginfo-5.65-150500.3.11.1
* bluez-debugsource-5.65-150500.3.11.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* bluez-cups-debuginfo-5.65-150500.3.11.1
* bluez-cups-5.65-150500.3.11.1
* bluez-debuginfo-5.65-150500.3.11.1
* bluez-debugsource-5.65-150500.3.11.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1209153
* https://bugzilla.suse.com/show_bug.cgi?id=1220329
1
0
01 Apr '24
# Security update for libvirt
Announcement ID: SUSE-SU-2024:1078-1
Rating: moderate
References:
* bsc#1221815
Cross-References:
* CVE-2024-2494
CVSS scores:
* CVE-2024-2494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for libvirt fixes the following issues:
* CVE-2024-2494: Fixed negative g_new0 length can lead to unbounded memory
allocation (bsc#1221815).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1078=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1078=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1078=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1078=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1078=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libvirt-lock-sanlock-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nodedev-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-7.1.0-150300.6.41.1
* libvirt-client-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-lxc-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-config-nwfilter-7.1.0-150300.6.41.1
* libvirt-admin-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-gluster-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.41.1
* wireshark-plugin-libvirt-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-7.1.0-150300.6.41.1
* libvirt-admin-7.1.0-150300.6.41.1
* libvirt-debugsource-7.1.0-150300.6.41.1
* libvirt-client-7.1.0-150300.6.41.1
* libvirt-lock-sanlock-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-7.1.0-150300.6.41.1
* libvirt-nss-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-hooks-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.41.1
* libvirt-devel-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.41.1
* libvirt-libs-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-lxc-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-gluster-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-7.1.0-150300.6.41.1
* wireshark-plugin-libvirt-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-7.1.0-150300.6.41.1
* libvirt-nss-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-7.1.0-150300.6.41.1
* libvirt-daemon-lxc-7.1.0-150300.6.41.1
* libvirt-daemon-config-network-7.1.0-150300.6.41.1
* libvirt-libs-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.41.1
* openSUSE Leap 15.3 (noarch)
* libvirt-bash-completion-7.1.0-150300.6.41.1
* libvirt-doc-7.1.0-150300.6.41.1
* openSUSE Leap 15.3 (x86_64)
* libvirt-client-32bit-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-libxl-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-libxl-7.1.0-150300.6.41.1
* libvirt-devel-32bit-7.1.0-150300.6.41.1
* libvirt-daemon-xen-7.1.0-150300.6.41.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.41.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libvirt-devel-64bit-7.1.0-150300.6.41.1
* libvirt-client-64bit-debuginfo-7.1.0-150300.6.41.1
* Server Applications Module 15-SP5 (noarch)
* libvirt-bash-completion-7.1.0-150300.6.41.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libvirt-debugsource-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libvirt-daemon-driver-nodedev-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-7.1.0-150300.6.41.1
* libvirt-daemon-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-7.1.0-150300.6.41.1
* libvirt-debugsource-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.41.1
* libvirt-libs-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-7.1.0-150300.6.41.1
* libvirt-libs-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libvirt-daemon-driver-nodedev-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-7.1.0-150300.6.41.1
* libvirt-client-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-7.1.0-150300.6.41.1
* libvirt-debugsource-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.41.1
* libvirt-libs-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-7.1.0-150300.6.41.1
* libvirt-libs-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.41.1
* libvirt-client-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libvirt-daemon-driver-nodedev-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-7.1.0-150300.6.41.1
* libvirt-client-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-7.1.0-150300.6.41.1
* libvirt-debugsource-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.41.1
* libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.41.1
* libvirt-libs-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-disk-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-7.1.0-150300.6.41.1
* libvirt-daemon-driver-network-7.1.0-150300.6.41.1
* libvirt-daemon-driver-secret-7.1.0-150300.6.41.1
* libvirt-libs-7.1.0-150300.6.41.1
* libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.41.1
* libvirt-client-7.1.0-150300.6.41.1
* libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.41.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.41.1
* libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.41.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2494.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221815
1
0
01 Apr '24
# Feature update for openblas
Announcement ID: SUSE-FU-2024:1075-1
Rating: important
References:
* bsc#1221813
* jsc#PED-7926
* jsc#PED-7927
Affected Products:
* Basesystem Module 15-SP5
* HPC Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that contains two features and has one fix can now be installed.
## Description:
This update for openblas fixes the following issues:
openblas was updated from version 0.3.21 to version 0.3.25 (jsc#PED-7926,
jsc#PED-7927, bsc#1221813):
* Changes in version 0.3.25:
* General:
* Improved the error message shown on exceeding the maximum thread count
* Improved the code to add supplementary thread buffers in case of overflow
* Fixed a potential division by zero in `?ROTG`
* Improved the `?MATCOPY` functions to accept zero-sized rows or columns
* Corrected empty prototypes in function declarations
* cleaned up unused declarations in the f2c-converted versions of the LAPACK sources
* Improved link line rewriting to avoid mixed libgomp/libomp builds with clang&gfortran
* imported the following changes from the upcoming release 3.12 of Reference-LAPACK: LAPACK PR 900, LAPACK PR 904, LAPACK PR 907, LAPACK PR 909, LAPACK PR 926, LAPACK PR 927, LAPACK PR 928 & 930
* Architecture x86-64:
* Fixed capability-based fallback selection for unknown cpus in `DYNAMIC_ARCH`
* Added AVX512 optimizations for `?ASUM` on Intel Sapphire Rapids and Cooper Lake
* Architecture ARM64:
* Fixed building with XCODE 15
* Fixed building on A64FX and Cortex A710/X1/X2
* increased the default buffer size for recent arm server cpus
* Architecture POWER PC:
* Added support for `DYNAMIC_ARCH` builds with clang
* Fixed union declaration in the `BFLOAT16` test case
* Changes in version 0.3.24:
* General:
* Declared the arguments of `cblas_xerbla` as `const` (in accordance with the reference implementation and others, the previous discrepancy appears to have dated back to GotoBLAS)
* Fixed the implementation of `?GEMMT` that was added in 0.3.23
* made cpu-specific `SWITCH_RATIO` parameters for GEMM available to `DYNAMIC_ARCH` builds
* Fixed missing `SSYCONVF` function in the shared library
* Fixed parallel build logic used with gmake
* Fixed several issues with the handling of runtime limits on the number of OPENMP threads
* Corrected the error code returned by `SGEADD`/`DGEADD` when LDA is too small
* Corrected the error code returned by `IMATCOPY` when LDB is too small
* Updated `?NRM2` to support negative increment values (as introduced in release 3.10.0 of the Reference BLAS)
* Updated `?ROTG` to use the safe scaling algorithm introduced in release 3.10.0 of the Reference BLAS
* Fixed OpenMP builds with CLANG for the case where libomp is not in a standard location
* Fixed a potential overwrite of unrelated memory during thread initialisation on startup
* Fixed a potential integer overflow in the multithreading threshold for `?SYMM`/`?SYRK`
* Fixed build of the LAPACKE interfaces for the LAPACK 3.11.0 `?TRSYL` functions added in 0.3.22
* Applied additions and corrections from the development branch of Reference-LAPACK:
* Fixed actual arguments passed to a number of LAPACK functions (from Reference-LAPACK PR 885)
* Fixed workspace query results in LAPACK `?SYTRF`/`?TRECV3` (from Reference-LAPACK PR 883)
* Fixed derivation of the UPLO parameter in `LAPACKE_?larfb` (from Reference-LAPACK PR 878)
* Fixed a crash in LAPACK `?GELSDD` on `NRHS=0` (from Reference-LAPACK PR 876)
* Added new LAPACK utility functions `CRSCL` and `ZRSCL` (from Reference-LAPACK PR 839)
* Corrected the order of eigenvalues for 2x2 matrices in `?STEMR` (Reference-LAPACK PR 867)
* Removed spurious reference to OpenMP variables outside OpenMP contexts (Reference-LAPACK PR 860)
* Updated file comments on use of `LAMBDA` variable in LAPACK (Reference-LAPACK PR 852)
* Fixed documentation of LAPACK `SLASD0`/`DLASD0` (Reference-LAPACK PR 855)
* Fixed confusing use of "minor" in LAPACK documentation (Reference-LAPACK PR 849)
* Added new LAPACK functions ?GEDMD for dynamic mode decomposition (Reference-LAPACK PR 736)
* Fixed potential stack overflows in the `EIG` part of the LAPACK testsuite (Reference-LAPACK PR 854)
* Applied small improvements to the variants of Cholesky and QR functions (Reference-LAPACK PR 847)
* Removed unused variables from LAPACK `?BDSQR` (Reference-LAPACK PR 832)
* Fixed a potential crash on allocation failure in LAPACKE `SGEESX`/`DGEESX` (Reference-LAPACK PR 836)
* Added a quick return from `SLARUV`/`DLARUV` for N < 1 (Reference-LAPACK PR 837)
* Updated function descriptions in LAPACK `?GEGS`/`?GEGV` (Reference-LAPACK PR 831)
* Improved algorithm description in `?GELSY` (Reference-LAPACK PR 833)
* Fixed scaling in LAPACK `STGSNA`/`DTGSNA` (Reference-LAPACK PR 830)
* Fixed crash in `LAPACKE_?geqrt` with row-major data (Reference-LAPACK PR 768)
* Added LAPACKE interfaces for `C/ZUNHR_COL` and `S/DORHR_COL` (Reference-LAPACK PR 827)
* Added error exit tests for `SYSV`/`SYTD2`/`GEHD2` to the testsuite (Reference-LAPACK PR 795)
* Fixed typos in LAPACK source and comments (Reference-LAPACK PRs 809,811,812,814,820)
* Adopt refactored `?GEBAL` implementation (Reference-LAPACK PR 808)
* Architecture x86_64:
* Added cpu model autodetection for Intel Alder Lake N
* Added activation of the AMX tile to the Sapphire Rapids `SBGEMM` kernel
* worked around miscompilations of GEMV/SYMV kernels by gcc's tree-vectorizer
* Fixed runtime detection of Cooperlake and Sapphire Rapids in `DYNAMIC_ARCH`
* Fixed feature-based cputype fallback in `DYNAMIC_ARCH`
* Corrected `ZAXPY` result on old pre-AVX hardware for the `INCX=0` case
* Fixed a potential use of uninitialized variables in ZTRSM
* Architecture ARMV8:
* implemented SWITCH_RATIO parameter for improved GEMM performance on Neoverse
* activated SVE SGEMM and DGEMM kernels for Neoverse V1
* Improved performance of the SVE CGEMM and ZGEMM kernels on Neoverse V1
* Improved kernel selection for the ARMV8SVE target and added it to `DYNAMIC_ARCH`
* Fixed runtime check for SVE availability in `DYNAMIC_ARCH` builds to take OS or container restrictions into account
* Fixed a potential use of uninitialized variables in ZTRSM
* Architecture POWER PC:
* Fixed compiler warnings in the POWER10 SBGEMM kernel
* Changes in version 0.3.23:
* General:
* Fixed a serious regression in `GETRF`/`GETF2` and `ZGETRF`/`ZGETF2` where subnormal but nonzero data elements triggered the singularity flag
* Fixed a long-standing bug in `CSPR`/`ZSPR` in single-threaded operation
* for cases where elements of the X vector are real numbers (or complex with only the real part zero)
* Architecture x86_64:
* Added further CPUID values for Intel Raptor Lake
* Changes in version 0.3.22:
* General:
* Updated the included LAPACK to Reference-LAPACK release 3.11.0 plus post-release corrections and improvements
* Added a threshold for multithreading in `SYMM`, `SYMV` and `SYR2K`
* Increased the threshold for multithreading in `SYRK`
* OpenBLAS no longer decreases the global `OMP_NUM_THREADS` when it exceeds the maximum thread count the library was compiled for.
* Fixed `?GETF2` potentially returning `NaN` with tiny matrix elements
* Fixed `openblas_set_num_threads` to work in `USE_OPENMP` builds.
* Fixed cpu core counting in `USE_OPENMP` builds returning the number of OMP "places" rather than cores
* Fixed stride calculation in the optimized small-matrix path of complex `SYR`
* Fixed building of Reference-LAPACK with recent gfortran
* Added new environment variable `OPENBLAS_DEFAULT_NUM_THREADS`
* Added a GEMV-based implementation of `GEMMT`
* Architecture x86_64:
* Added autodetection of Intel Raptor Lake cpu models
* Added SSCAL microkernels for Haswell and newer targets
* Improved the performance of the Haswell DSCAL microkernel
* Added CSCAL and ZSCAL microkernels for SkylakeX targets
* Fixed detection of gfortran and Cray CCE compilers
* Fixed runtime selection of COOPERLAKE in `DYNAMIC_ARCH` builds
* Worked around gcc/llvm using risky FMA operations in CSCAL/ZSCAL
* Architecture ARMV8:
* Fixed cross-compilation to CortexA53 with CMAKE
* Fixed compilation with CMAKE and "Arm Compiler for Linux 22.1"
* Added cpu autodetection for Cortex X3 and A715
* Fixed conditional compilation of SVE-capable targets in `DYNAMIC_ARCH`
* sped up SVE kernels by removing unnecessary prefetches
* Improved the GEMM performance of Neoverse V1
* Added SVE kernels for SDOT and DDOT
* Added an SBGEMM kernel for Neoverse N2
* Improved cpu-specific compiler option selection for Neoverse cpus
* Added support for setting `CONSISTENT_FPCSR`
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1075=1 openSUSE-SLE-15.5-2024-1075=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1075=1
* HPC Module 15-SP5
zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-1075=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1075=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openblas_0_3_25-gnu12-hpc-debugsource-0.3.25-150500.4.5.1
* libopenblas-gnu-hpc-devel-0.3.25-150500.4.5.1
* openblas_0_3_25-gnu-hpc-debugsource-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu12-hpc-debugsource-0.3.25-150500.4.5.1
* libopenblas_pthreads0-debuginfo-0.3.25-150500.4.5.2
* libopenblas-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-devel-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu-hpc-devel-static-0.3.25-150500.4.5.1
* openblas_serial-debugsource-0.3.25-150500.4.5.1
* openblas_pthreads-devel-static-0.3.25-150500.4.5.2
* libopenblas_pthreads0-0.3.25-150500.4.5.2
* openblas_openmp-devel-static-0.3.25-150500.4.5.2
* libopenblas_0_3_25-gnu-hpc-0.3.25-150500.4.5.1
* openblas_openmp-debugsource-0.3.25-150500.4.5.2
* libopenblas_pthreads-devel-0.3.25-150500.4.5.2
* libopenblas-pthreads_0_3_25-gnu-hpc-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu-hpc-debugsource-0.3.25-150500.4.5.1
* openblas_0_3_25-gnu12-hpc-devel-static-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas_serial-devel-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu12-hpc-devel-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu12-hpc-devel-static-0.3.25-150500.4.5.1
* libopenblas_serial0-debuginfo-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas_openmp-devel-0.3.25-150500.4.5.2
* openblas_serial-devel-static-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu12-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas_openmp0-0.3.25-150500.4.5.2
* libopenblas-pthreads-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas_openmp0-debuginfo-0.3.25-150500.4.5.2
* libopenblas-pthreads_0_3_25-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-debuginfo-0.3.25-150500.4.5.1
* openblas_pthreads-debugsource-0.3.25-150500.4.5.2
* libopenblas-pthreads-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas_serial0-0.3.25-150500.4.5.1
* openblas-common-devel-0.3.25-150500.4.5.1
* openblas_0_3_25-gnu-hpc-devel-static-0.3.25-150500.4.5.1
* openSUSE Leap 15.5 (x86_64)
* libopenblas_pthreads0-32bit-0.3.25-150500.4.5.2
* libopenblas_openmp-devel-32bit-0.3.25-150500.4.5.2
* libopenblas_pthreads-devel-32bit-0.3.25-150500.4.5.2
* libopenblas_pthreads0-32bit-debuginfo-0.3.25-150500.4.5.2
* libopenblas_openmp0-32bit-0.3.25-150500.4.5.2
* libopenblas_serial-devel-32bit-0.3.25-150500.4.5.1
* libopenblas_serial0-32bit-debuginfo-0.3.25-150500.4.5.1
* libopenblas_openmp0-32bit-debuginfo-0.3.25-150500.4.5.2
* libopenblas_serial0-32bit-0.3.25-150500.4.5.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenblas_pthreads-devel-64bit-0.3.25-150500.4.5.2
* libopenblas_serial0-64bit-0.3.25-150500.4.5.1
* libopenblas_openmp-devel-64bit-0.3.25-150500.4.5.2
* libopenblas_openmp0-64bit-0.3.25-150500.4.5.2
* libopenblas_serial0-64bit-debuginfo-0.3.25-150500.4.5.1
* libopenblas_serial-devel-64bit-0.3.25-150500.4.5.1
* libopenblas_pthreads0-64bit-debuginfo-0.3.25-150500.4.5.2
* libopenblas_pthreads0-64bit-0.3.25-150500.4.5.2
* libopenblas_openmp0-64bit-debuginfo-0.3.25-150500.4.5.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libopenblas_openmp0-0.3.25-150500.4.5.2
* libopenblas_pthreads0-0.3.25-150500.4.5.2
* libopenblas_openmp0-debuginfo-0.3.25-150500.4.5.2
* libopenblas_pthreads0-debuginfo-0.3.25-150500.4.5.2
* openblas_openmp-debugsource-0.3.25-150500.4.5.2
* openblas_serial-debugsource-0.3.25-150500.4.5.1
* openblas-common-devel-0.3.25-150500.4.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* openblas_pthreads-debugsource-0.3.25-150500.4.5.2
* libopenblas_pthreads-devel-0.3.25-150500.4.5.2
* Basesystem Module 15-SP5 (s390x)
* libopenblas_openmp-devel-0.3.25-150500.4.5.2
* HPC Module 15-SP5 (aarch64 x86_64)
* openblas_0_3_25-gnu12-hpc-debugsource-0.3.25-150500.4.5.1
* libopenblas-gnu-hpc-devel-0.3.25-150500.4.5.1
* openblas_0_3_25-gnu-hpc-debugsource-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu12-hpc-debugsource-0.3.25-150500.4.5.1
* libopenblas-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu-hpc-0.3.25-150500.4.5.1
* openblas-pthreads_0_3_25-gnu-hpc-debugsource-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu12-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu12-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas-pthreads_0_3_25-gnu12-hpc-0.3.25-150500.4.5.1
* libopenblas_0_3_25-gnu12-hpc-debuginfo-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu12-hpc-0.3.25-150500.4.5.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x)
* libopenblas-pthreads-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas-pthreads-gnu-hpc-devel-0.3.25-150500.4.5.1
* libopenblas-gnu-hpc-0.3.25-150500.4.5.1
* libopenblas-gnu-hpc-devel-0.3.25-150500.4.5.1
* SUSE Package Hub 15 15-SP5 (s390x)
* libopenblas_pthreads0-0.3.25-150500.4.5.2
* libopenblas_pthreads0-debuginfo-0.3.25-150500.4.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221813
* https://jira.suse.com/browse/PED-7926
* https://jira.suse.com/browse/PED-7927
1
0
# Recommended update for kio
Announcement ID: SUSE-RU-2024:1077-1
Rating: moderate
References:
* bsc#1215704
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that has one fix can now be installed.
## Description:
This update for kio fixes the following issues:
* Added missing kio-devel to Package Hub for SLE-15-SP5 (no source changes)
(bsc#1215704)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1077=1 openSUSE-SLE-15.5-2024-1077=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1077=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1077=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1077=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1077=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* kio-devel-5.103.0-150500.3.2.1
* python3-clang15-15.0.7-150500.4.6.2
* kio-core-debuginfo-5.103.0-150500.3.2.1
* llvm15-15.0.7-150500.4.6.2
* llvm15-devel-debuginfo-15.0.7-150500.4.6.2
* clang15-debuginfo-15.0.7-150500.4.6.2
* llvm15-devel-15.0.7-150500.4.6.2
* llvm15-gold-debuginfo-15.0.7-150500.4.6.2
* libLTO15-15.0.7-150500.4.6.2
* libclang13-debuginfo-15.0.7-150500.4.6.2
* llvm15-polly-15.0.7-150500.4.6.2
* llvm15-debuginfo-15.0.7-150500.4.6.2
* libLTO15-debuginfo-15.0.7-150500.4.6.2
* libclang13-15.0.7-150500.4.6.2
* llvm15-polly-devel-15.0.7-150500.4.6.2
* clang15-devel-15.0.7-150500.4.6.2
* libLLVM15-15.0.7-150500.4.6.2
* kio-devel-debuginfo-5.103.0-150500.3.2.1
* lld15-15.0.7-150500.4.6.2
* clang-tools-debuginfo-15.0.7-150500.4.6.2
* kio-debuginfo-5.103.0-150500.3.2.1
* kio-debugsource-5.103.0-150500.3.2.1
* lld15-debuginfo-15.0.7-150500.4.6.2
* llvm15-gold-15.0.7-150500.4.6.2
* llvm15-polly-debuginfo-15.0.7-150500.4.6.2
* kio-5.103.0-150500.3.2.1
* kio-core-5.103.0-150500.3.2.1
* libclang-cpp15-15.0.7-150500.4.6.2
* clang-tools-15.0.7-150500.4.6.2
* clang15-15.0.7-150500.4.6.2
* libLLVM15-debuginfo-15.0.7-150500.4.6.2
* libclang-cpp15-debuginfo-15.0.7-150500.4.6.2
* openSUSE Leap 15.5 (noarch)
* llvm15-opt-viewer-15.0.7-150500.4.6.2
* llvm15-doc-15.0.7-150500.4.6.2
* kio-lang-5.103.0-150500.3.2.1
* llvm15-vim-plugins-15.0.7-150500.4.6.2
* clang15-doc-15.0.7-150500.4.6.2
* openSUSE Leap 15.5 (x86_64)
* lldb15-15.0.7-150500.4.6.2
* libclang-cpp15-32bit-15.0.7-150500.4.6.2
* libLLVM15-32bit-debuginfo-15.0.7-150500.4.6.2
* liblldb15-debuginfo-15.0.7-150500.4.6.2
* lldb15-debuginfo-15.0.7-150500.4.6.2
* liblldb15-15.0.7-150500.4.6.2
* lldb15-devel-15.0.7-150500.4.6.2
* libLLVM15-32bit-15.0.7-150500.4.6.2
* python3-lldb15-15.0.7-150500.4.6.2
* libclang-cpp15-32bit-debuginfo-15.0.7-150500.4.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64 i586)
* libomp15-devel-debuginfo-15.0.7-150500.4.6.2
* libomp15-devel-15.0.7-150500.4.6.2
* openSUSE Leap 15.5 (aarch64 x86_64)
* libc++1-15.0.7-150500.4.6.2
* libc++abi1-debuginfo-15.0.7-150500.4.6.2
* libc++-devel-15.0.7-150500.4.6.2
* libc++1-debuginfo-15.0.7-150500.4.6.2
* libc++abi1-15.0.7-150500.4.6.2
* libc++abi-devel-15.0.7-150500.4.6.2
* openSUSE Leap 15.5 (aarch64_ilp32)
* libclang-cpp15-64bit-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-64bit-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-64bit-15.0.7-150500.4.6.2
* libclang-cpp15-64bit-15.0.7-150500.4.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* llvm15-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-15.0.7-150500.4.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* llvm15-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-15.0.7-150500.4.6.2
* Basesystem Module 15-SP5 (aarch64 x86_64)
* libc++1-15.0.7-150500.4.6.2
* libc++abi1-debuginfo-15.0.7-150500.4.6.2
* libc++-devel-15.0.7-150500.4.6.2
* libc++1-debuginfo-15.0.7-150500.4.6.2
* libc++abi1-15.0.7-150500.4.6.2
* libc++abi-devel-15.0.7-150500.4.6.2
* Basesystem Module 15-SP5 (x86_64)
* libLLVM15-32bit-debuginfo-15.0.7-150500.4.6.2
* libLLVM15-32bit-15.0.7-150500.4.6.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libclang13-debuginfo-15.0.7-150500.4.6.2
* libclang-cpp15-debuginfo-15.0.7-150500.4.6.2
* libclang-cpp15-15.0.7-150500.4.6.2
* llvm15-debuginfo-15.0.7-150500.4.6.2
* libclang13-15.0.7-150500.4.6.2
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* kio-devel-5.103.0-150500.3.2.1
* python3-clang15-15.0.7-150500.4.6.2
* kio-core-debuginfo-5.103.0-150500.3.2.1
* llvm15-15.0.7-150500.4.6.2
* llvm15-devel-15.0.7-150500.4.6.2
* clang15-debuginfo-15.0.7-150500.4.6.2
* libLTO15-15.0.7-150500.4.6.2
* llvm15-polly-15.0.7-150500.4.6.2
* libclang13-15.0.7-150500.4.6.2
* llvm15-polly-devel-15.0.7-150500.4.6.2
* clang15-devel-15.0.7-150500.4.6.2
* lld15-debuginfo-15.0.7-150500.4.6.2
* lld15-15.0.7-150500.4.6.2
* clang-tools-debuginfo-15.0.7-150500.4.6.2
* kio-debuginfo-5.103.0-150500.3.2.1
* kio-debugsource-5.103.0-150500.3.2.1
* llvm15-gold-15.0.7-150500.4.6.2
* kio-5.103.0-150500.3.2.1
* kio-core-5.103.0-150500.3.2.1
* libclang-cpp15-15.0.7-150500.4.6.2
* clang-tools-15.0.7-150500.4.6.2
* clang15-15.0.7-150500.4.6.2
* libclang-cpp15-debuginfo-15.0.7-150500.4.6.2
* SUSE Package Hub 15 15-SP5 (noarch)
* llvm15-opt-viewer-15.0.7-150500.4.6.2
* llvm15-vim-plugins-15.0.7-150500.4.6.2
* clang15-doc-15.0.7-150500.4.6.2
* llvm15-doc-15.0.7-150500.4.6.2
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64)
* libomp15-devel-15.0.7-150500.4.6.2
* SUSE Package Hub 15 15-SP5 (x86_64)
* liblldb15-15.0.7-150500.4.6.2
* python3-lldb15-15.0.7-150500.4.6.2
* liblldb15-debuginfo-15.0.7-150500.4.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1215704
1
0
01 Apr '24
# Security update for qpid-proton
Announcement ID: SUSE-SU-2024:1074-1
Rating: important
References:
* bsc#1041090
* bsc#1084627
* bsc#1133158
* bsc#1172267
* bsc#1191783
Cross-References:
* CVE-2019-0223
CVSS scores:
* CVE-2019-0223 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2019-0223 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2019-0223 ( NVD ): 7.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability and has four security fixes can now be
installed.
## Description:
This update for qpid-proton fixes the following issues:
* CVE-2019-0223: Fixed TLS Man in the Middle Vulnerability (bsc#1133158).
The following non-security bugs were fixed:
* Fix build with OpenSSL 3.0.0 (bsc#1172267)
* Sort linked .o files to make package build reproducible (bsc#1041090)
* Fix build with gcc8 (bsc#1084627)
* Move libqpid-proton-core to a different package to fix a rpmlint error
(bsc#1191783)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1074=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1074=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-python-qpid-proton-0.38.0-150000.6.3.1
* qpid-proton-debugsource-0.38.0-150000.6.3.1
* python3-python-qpid-proton-debuginfo-0.38.0-150000.6.3.1
* qpid-proton-devel-0.38.0-150000.6.3.1
* qpid-proton-debuginfo-0.38.0-150000.6.3.1
* openSUSE Leap 15.5 (noarch)
* qpid-proton-devel-doc-0.38.0-150000.6.3.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qpid-proton-debugsource-0.38.0-150000.6.3.1
* qpid-proton-debuginfo-0.38.0-150000.6.3.1
## References:
* https://www.suse.com/security/cve/CVE-2019-0223.html
* https://bugzilla.suse.com/show_bug.cgi?id=1041090
* https://bugzilla.suse.com/show_bug.cgi?id=1084627
* https://bugzilla.suse.com/show_bug.cgi?id=1133158
* https://bugzilla.suse.com/show_bug.cgi?id=1172267
* https://bugzilla.suse.com/show_bug.cgi?id=1191783
1
0
openSUSE-SU-2024:0098-1: important: Security update for opera
by opensuse-security@opensuse.org 01 Apr '24
by opensuse-security@opensuse.org 01 Apr '24
01 Apr '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0098-1
Rating: important
References:
Cross-References: CVE-2024-2400
Affected Products:
openSUSE Leap 15.5:NonFree
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for opera fixes the following issues:
- Update to 108.0.5067.40
* CHR-9668 Update Chromium on desktop-stable-122-5067 to 122.0.6261.129
* DNA-115396 Bolded camera icon when camera access is allowed
- The update to chromium 122.0.6261.129 fixes following issues:
CVE-2024-2400
- Changes in 108.0.5067.24
* CHR-9416 Updating Chromium on desktop-stable-* branches
* DNA-115080 Crash at opera::component_based::
ComponentDragController::ResetDragging()
- Changes in 108.0.5067.20
* CHR-9642 Update Chromium on desktop-stable-122-5067 to 122.0.6261.70
* DNA-114217 [macOS] Services on the sidebar are not responding when
browser window is on external monitor
* DNA-114612 Crash at syncer::SyncEngineImpl::
OnInvalidationReceived(std::__Cr::basic_string const&)
* DNA-114816 Update removed search engines and reset flags to default
* DNA-114848 Workspace can not be removed from sidebar setup
* DNA-114935 After an update extensions’ icons in the Sidebar are black
* DNA-115087 Translations for O108
* DNA-115228 Adblocker is blocking ads when turned off
* DNA-115232 Promote 108 to stable
- Complete Opera 108 changelog at:
https://blogs.opera.com/desktop/changelog-for-108/
- Update to 107.0.5045.36
* CHR-9416 Updating Chromium on desktop-stable-* branches
* DNA-114562 Fraud warning page missed animation
* DNA-115103 Crash at opera::AdjustNavigationParamsWhen
IntroductionIsActive(NavigateParams*)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.5:NonFree:
zypper in -t patch openSUSE-2024-98=1
Package List:
- openSUSE Leap 15.5:NonFree (x86_64):
opera-108.0.5067.40-lp155.3.39.1
References:
https://www.suse.com/security/cve/CVE-2024-2400.html
1
0