openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
May 2024
- 3 participants
- 163 discussions
16 May '24
# Recommended update for coreutils
Announcement ID: SUSE-RU-2024:1665-1
Rating: moderate
References:
* bsc#1221632
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for coreutils fixes the following issues:
* ls: avoid triggering automounts (bsc#1221632)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1665=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1665=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1665=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1665=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1665=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1665=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1665=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1665=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1665=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1665=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1665=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1665=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1665=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1665=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1665=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1665=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1665=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1665=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* coreutils-debuginfo-8.32-150400.9.6.1
* coreutils-testsuite-8.32-150400.9.6.2
* coreutils-single-8.32-150400.9.6.1
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-single-debuginfo-8.32-150400.9.6.1
* coreutils-single-debugsource-8.32-150400.9.6.1
* openSUSE Leap 15.4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* coreutils-debuginfo-8.32-150400.9.6.1
* coreutils-testsuite-8.32-150400.9.6.2
* coreutils-single-8.32-150400.9.6.1
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-single-debuginfo-8.32-150400.9.6.1
* coreutils-single-debugsource-8.32-150400.9.6.1
* openSUSE Leap 15.5 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* Basesystem Module 15-SP5 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Manager Proxy 4.3 (x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Manager Proxy 4.3 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* coreutils-8.32-150400.9.6.1
* coreutils-debugsource-8.32-150400.9.6.1
* coreutils-debuginfo-8.32-150400.9.6.1
* SUSE Manager Server 4.3 (noarch)
* coreutils-lang-8.32-150400.9.6.1
* coreutils-doc-8.32-150400.9.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221632
1
0
16 May '24
# Recommended update for coreutils
Announcement ID: SUSE-RU-2024:1666-1
Rating: moderate
References:
* bsc#1221632
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has one fix can now be installed.
## Description:
This update for coreutils fixes the following issues:
* ls: avoid triggering automounts (bsc#1221632)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1666=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1666=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1666=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1666=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1666=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1666=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1666=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1666=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-single-debugsource-8.32-150300.3.8.1
* coreutils-testsuite-8.32-150300.3.8.1
* coreutils-single-debuginfo-8.32-150300.3.8.1
* coreutils-single-8.32-150300.3.8.1
* openSUSE Leap 15.3 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* coreutils-lang-8.32-150300.3.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* coreutils-lang-8.32-150300.3.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* coreutils-lang-8.32-150300.3.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* coreutils-lang-8.32-150300.3.8.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Enterprise Storage 7.1 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* coreutils-lang-8.32-150300.3.8.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* coreutils-doc-8.32-150300.3.8.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* coreutils-debugsource-8.32-150300.3.8.1
* coreutils-debuginfo-8.32-150300.3.8.1
* coreutils-8.32-150300.3.8.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221632
1
0
15 May '24
openSUSE Recommended Update: Recommended update for gh
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0127-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for gh fixes the following issues:
- Update to version 2.49.2:
* build(deps): bump github.com/sigstore/protobuf-specs from 0.3.1 to
0.3.2
* Add further docs to Option type
* Comment further on config changes
* Remove unnecessary config list variable
* Fix mistaken find and replace for Option type
* Fix repo fork to use remote protocol if none configured
* Avoid reconstructing config Options on each use
* Make config list less fallible
* Provide more type safety around config values
* Move config interfaces into gh package (#9060)
* Fix typos
* Creating doc to capture Codespace usage guidance
* Fix test function name
* Add test to verify JSON fields section is rendered in Markdown
* Output `JSON Fields` section in Markdown
* Add test to verify JSON fields section is rendered
* Add `jsonCmd` test command variable
* Output `JSON Fields` section
* Output `JSON FIELDS`
* Add tests to verify proper `help:json-fields` annotations
* Add `help:json-fields` annotation
* Add `FormatSlice` function
* Add --latest=false example to `release create` command
* Update create.go
* Add --latest=false to `gh release create` docs
- Update to version 2.49.1:
* Fix `attestation verify` source repository check bug
* Fix unused params across project
* Add support for jobs with long filenames
* Run `attestation` command set integration tests separately
* build(deps): bump golang.org/x/net from 0.22.0 to 0.23.0
* Adjust short and long to be the same
* Do not mutate headers when initialising tableprinter
* Document relationship between host and active account
- Update to version 2.49.0:
* Document repo clone protocol behaviour
* whitespace aligment for inspect/inspect.go
* whitespace alignment in attestation/attestation.go
* Added tweaked note to tuf-root-verify
* Tweaked gh attestation help strings to generate nicer cli manual site.
* Update attestation's beta designation
* Update cli/go-gh to v2.9.0
* Add beta designation on attestation command set
* Test `gh at verify -b` does not require auth
* Use ghinstance package for attestation host checks
* Test cmdutil.IsAuthCheckEnabled cases
* Fix issue with closing pager stream (#9020)
* Support long URLs in `gh repo clone` (#9008)
* check for enterprise host
* Add missing title field for projectv2
* Match query fields with `ProjectV2` type
* Include `URL` in `ProjectV2` type
* Include `projectsV2` in GraphQL query
* Remove unnecessary defensive check
* Test verification failures when attestations are bad
* Rework sigstore tests for easier maintenance
* Make error more obvious when bundle has wrong extension
* Add colon at the end of secret prompts (#9004)
* Use cmdutil.ExactArgs instead of MinimumArgs; also add tests
* proof of concept for flag-level disable auth check
* remove hidden flag from attestation command (#8998)
* Update `gh attestation verify` output (#8991)
* Just base verification policy on trusted root, not bundle
* Support offline mode for `gh attestation verify`
* build(deps): bump google.golang.org/grpc from 1.62.1 to 1.62.2
* `gh attestation tuf-root-verify` offline test fix (#8975)
* Update `sigstore-go` dependency to v0.3.0 (#8977)
* build(deps): bump golang.org/x/net from 0.21.0 to 0.23.0
* Make it clearer that job flag is meant to be an ID
* Ignore run-id when providing also job for rerun
- Update to version 2.48.0:
* Update install_linux.md (#8950)
* Remove unnecessary --help comment
* Fix `go` directive in `go.mod` (#8956)
* Use `filepath.Join` to support different platforms
* Run `go mod tidy`
* Refactor into table tests
* Explain `--skip-ssh-key` usage in long doc
* Tidy `go.mod`
* Fix cache contention in Go CI jobs
* Fix `attestation` cmd offline unit test failure (#8933)
* Change subcommands default to be more user friendly
* Add unit test, update naming, ensure DSSE envelope is in-toto
* Updates from linter feedback
* Add support to `attestation` command for more predicate types.
* Close zip file in run view tests
* Ensure run log cache creates cache dir if it doesn't exist
* Test `--skip-ssh-key` is captured correctly
* Add test to verify skipped SSH key prompts
* Add `--skip-ssh-key` to options
* Add `SkipSSHKey` field to `LoginOptions`
* Add tests for non-happy field paths
* Fix api cache test
* Use testify in git url tests
* Ensure cache dir is always available in RunLogCache
* Remove RunLogCache interface
* Use real Run Log Cache in run view tests
* Capture error on Run Log Cache Exists
* Rework Run Log Cache so that cache dir is injected
* Expose CacheDir on Config
* Minorly refactor scheme normalization in git ParseURL
* Test for parsing error in git ParseURL
* Remove naked returns from git ParseURL
* Fix parsing IPv6 remote URLs (#8893)
* Add codeowners entry for the GitHub TUF root included in the
`attestation` command set (#8919)
* Add comment to explain `showSelectedReposInfo` assignment
* Rename const to avoid CodeQL error
* Add tests to verify `numSelectedRepos` is populated when necessary
* Populate `numSelectedRepos` only if needed
* build(deps): bump google.golang.org/grpc from 1.61.1 to 1.61.2
* Run defers in queue
* Resolve PR comments
* Wrap JSON arrays, objects in array with --slurp
* Resolve PR comments
* Clarify --merge-pages docs
* Replace --paginate-all with --merge-pages
* Resolve test issues
* Add more JSON merge tests
* Move jsonmerge package to internal
* Merge JSON responses from `gh api`
* Add tests for `FindByRepo`
* Apply suggestions from code review
* Improve error message returned by `FindByRepo`
* Add test cases to verify exported JSON has non-zero `numSelectedRepos`
* Populate `numSelectedRepos` in non-interactive mode, if explicitly
selected
* Anchor the log filename to the start
* Add pr url pattern
* Test pr url lock
* update example for deeply nested array update
* allow multiple items in nested array
- Update to version 2.47.0:
* Bump go-gh to v2.8.0 and go mod tidy
* build(deps): bump github.com/sigstore/protobuf-specs from 0.3.0 to
0.3.1
* Bump glamour to v0.7.0 and go mod tidy
* build(deps): bump github.com/google/go-containerregistry
* build(deps): bump github.com/gorilla/websocket from 1.5.0 to 1.5.1
* build(deps): bump google.golang.org/grpc from 1.61.0 to 1.61.1
* Rely on go.mod go version in all workflows (#8911)
* Upgrade to Go 1.22 (#8836)
* build(deps): bump github.com/docker/docker
* build(deps): bump gopkg.in/go-jose/go-jose.v2 from 2.6.1 to 2.6.3
* gh-attestation cmd integration (#8698)
* fix segfault in `gh repo rename`
* Bump go-gh to 2.7.0
* Fix typo in auth switch help example
- Update to version 2.46.0:
* Include draft ID in project item list JSON (#8754)
* build(deps): bump github.com/cpuguy83/go-md2man/v2 from 2.0.3 to 2.0.4
* Document run watch and view not supporting fine grained PATs
* Document auth switch behaviour for two or more accounts
* Improve discovery of `gh auth status`
* grammar: avoid e.g.+etc. together
* Fix the description of `gh release upload`
* Bump go-keyring to fix race condition
* feat: support `dry-run` in gh `pr create` (#8376)
* build(deps): bump google.golang.org/protobuf from 1.30.0 to 1.33.0
* fixed doc string
* remove repetitive word
* Fix breaking test for PR/issue # change
* Enhance 2nd round of issue and PR number output
* Apply first round of owner/repo#number consistency
* fix: format files
* feat(merge): add owner/repo in prompt
- Update to version 2.45.0:
* Bump cli/go-gh v2.6.0 for tenant using GH_TOKEN (#8787)
* Support `project view --web` with TTY (#8773)
* Handle case: some system set 600 mod for new file.
* Clarify helptext for `gh search issues` and `gh search repos`
regarding archived repos
* Make minor cache list ref flag adjustments
* Update incorrect regex comment for client Commits
* Use regex to split apart the git client Commit logs
* Use null byte separators when fetching comments from git
* Add new tests to git client Commits
* Remove unnecessary split conditional from client Commits
* Extract new test helper for git client Commits
* redirect users to the `gh environment` command
* Revert "make comments in the default config file more informative"
* make comments in the default config file more informative
* fixed whitespace
* Clarify helptext for search prs regarding archived repos
* bug: fixed the result.Operation variable prior to patchRepoVariable
being called in the setVariable function.
* Remove mainLoop label from garden
* feat: Add `ref` option to `gh cache list`
* chore: simplify parameter `owner`
* Support for `[HOST/]OWNER/REPO` format
* Replace `assert` with `require` in testing
* Simplify install command for Debian & Ubuntu
* Remove `--format` flag and add description for not specifying `--repo`
and `--team` flag
* Fix printed project number
* Support for directory based repo and `GH_REPO` env variable
* Change the output of link` and `unlink`
* Refactor `OrganizationTeam`
* Replace `httpmock` with `gock` in testing
* handle flags with `cmdutil.MutuallyExclusive`, and move mutation
methods to `queries.go`
* fix wording, move conditional blocks to functions, and add api to
retrieve the ID of a team
* Fix wording
* Add testing for link and unlink
* Support for team
* Support for unlink
* Remove support for team
* Link Project to Repository or Team Command
- Update to version 2.44.1:
* Fix PR create regression around title and body when there is only one
commit by @williammartin in #8707
- Update to version 2.44.0:
* Feature: added Order flag for release list command by @leevic31 in
#8632
* autofill with body by @guerinoni in #8423
* Add default values to web manual and man pages by @zsloane in #8395
* build(deps): bump microsoft/setup-msbuild from 1.3.2 to 2.0.0 by
@dependabot in #8648
* Documentation for built-in aliases by @Rebeccasun31 in #8367
* Add more detail to fork failure message by @chrisroat in #8614
* feat: Add cache key option to gh cache list by @toshimaru in #8667
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-127=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
gh-2.49.2-bp155.2.6.1
- openSUSE Backports SLE-15-SP5 (noarch):
gh-bash-completion-2.49.2-bp155.2.6.1
gh-fish-completion-2.49.2-bp155.2.6.1
gh-zsh-completion-2.49.2-bp155.2.6.1
References:
1
0
15 May '24
# Recommended update for pam_pkcs11
Announcement ID: SUSE-RU-2024:1660-1
Rating: moderate
References:
* bsc#1221255
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for pam_pkcs11 fixes the following issue:
* Fix 0001-Set-slot_num-configuration-parameter-to-0-by-default (bsc#1221255)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1660=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1660=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1660=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1660=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1660=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1660=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1660=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1660=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1660=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1660=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1660=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1660=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1660=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1660=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1660=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1660=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1660=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1660=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1660=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1660=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1660=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1660=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1660=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1660=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1660=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1660=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1660=1
## Package List:
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-devel-doc-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* openSUSE Leap 15.5 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* Basesystem Module 15-SP5 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Manager Proxy 4.3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Manager Server 4.3 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Enterprise Storage 7.1 (x86_64)
* pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-32bit-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* pam_pkcs11-0.6.10-150100.3.3.2
* pam_pkcs11-debuginfo-0.6.10-150100.3.3.2
* pam_pkcs11-debugsource-0.6.10-150100.3.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1221255
1
0
SUSE-RU-2024:1649-1: moderate: Recommended update for product-builder
by OPENSUSE-UPDATES 14 May '24
by OPENSUSE-UPDATES 14 May '24
14 May '24
# Recommended update for product-builder
Announcement ID: SUSE-RU-2024:1649-1
Rating: moderate
References:
* bsc#1224010
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that has one fix can now be installed.
## Description:
This update for product-builder fixes the following issue:
* PowerPC build failure introduced in 1.2.16 (bsc#1224010)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1649=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1649=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1649=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1649=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* product-builder-1.2.17-150400.3.9.2
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* product-builder-1.2.17-150400.3.9.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* product-builder-1.2.17-150400.3.9.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* product-builder-1.2.17-150400.3.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224010
1
0
openSUSE-RU-2024:0126-1: moderate: Recommended update for OpenBoard
by maintenance@opensuse.org 14 May '24
by maintenance@opensuse.org 14 May '24
14 May '24
openSUSE Recommended Update: Recommended update for OpenBoard
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0126-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for OpenBoard fixes the following issues:
- update to version 1.7.1
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-126=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
OpenBoard-1.7.1-bp155.3.6.1
References:
1
0
SUSE-RU-2024:1637-1: moderate: Recommended update for google-cloud SDK
by OPENSUSE-UPDATES 14 May '24
by OPENSUSE-UPDATES 14 May '24
14 May '24
# Recommended update for google-cloud SDK
Announcement ID: SUSE-RU-2024:1637-1
Rating: moderate
References:
* bsc#1210617
* jsc#PED-6697
* jsc#PED-7987
Cross-References:
* CVE-2023-30608
CVSS scores:
* CVE-2023-30608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-30608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability and contains two features can now be
installed.
## Description:
This update for google-cloud SDK fixes the following issues:
* Add python311 cloud services packages and dependencies (jsc#PED-7987,
jsc#PED-6697)
* Bellow 5 binaries Obsolete the python3.6 counterpart: python311-google-
resumable-media python311-google-api-core python311-google-cloud-storage
python311-google-cloud-core python311-googleapis-common-protos
* Regular python311 updates (without Obsoletes): python-google-auth python-
grpcio python-sqlparse
* New python311 packages: libcrc32c python-google-cloud-appengine-logging
python-google-cloud-artifact-registry python-google-cloud-audit-log python-
google-cloud-build python-google-cloud-compute python-google-cloud-dns
python-google-cloud-domains python-google-cloud-iam python-google-cloud-kms-
inventory python-google-cloud-kms python-google-cloud-logging python-google-
cloud-run python-google-cloud-secret-manager python-google-cloud-service-
directory python-google-cloud-spanner python-google-cloud-vpc-access python-
google-crc32c python-grpc-google-iam-v1 python-grpcio-status python-proto-
plus
In python-sqlparse this security issue was fixed:
CVE-2023-30608: Fixed parser that contained a regular expression that is
vulnerable to ReDOS (Regular Expression Denial of Service) (bsc#1210617)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1637=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1637=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1637=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1637=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1637=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1637=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1637=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1637=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1637=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1637=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1637=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1637=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1637=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1637=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1637=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-grpcio-1.60.1-150400.9.7.2
* python311-grpcio-debuginfo-1.60.1-150400.9.7.2
* protobuf-devel-debuginfo-25.1-150400.9.6.1
* python311-cryptography-debuginfo-41.0.3-150400.16.19.1
* protobuf-debugsource-25.1-150400.9.6.1
* protobuf-java-25.1-150400.9.6.1
* protobuf-devel-25.1-150400.9.6.1
* libprotoc25_1_0-25.1-150400.9.6.1
* libprotobuf25_1_0-25.1-150400.9.6.1
* python311-google-crc32c-1.5.0-150400.9.3.1
* python311-cryptography-41.0.3-150400.16.19.1
* libcrc32c-devel-1.1.2-150400.9.3.1
* libcrc32c1-debuginfo-1.1.2-150400.9.3.1
* python311-protobuf-4.25.1-150400.9.6.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* libcrc32c-debugsource-1.1.2-150400.9.3.1
* python-cryptography-debugsource-41.0.3-150400.16.19.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.6.1
* python-google-crc32c-debugsource-1.5.0-150400.9.3.1
* libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1
* python311-cffi-1.15.1-150400.8.7.2
* python-cffi-debugsource-1.15.1-150400.8.7.2
* python-grpcio-debugsource-1.60.1-150400.9.7.2
* python311-cffi-debuginfo-1.15.1-150400.8.7.2
* libcrc32c1-1.1.2-150400.9.3.1
* openSUSE Leap 15.4 (x86_64)
* libprotobuf25_1_0-32bit-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-32bit-25.1-150400.9.6.1
* libprotoc25_1_0-32bit-25.1-150400.9.6.1
* openSUSE Leap 15.4 (noarch)
* python311-pytz-2023.3-150400.6.6.1
* python311-google-cloud-dns-0.35.0-150400.9.3.1
* python311-google-resumable-media-2.7.0-150400.10.4.1
* python311-sqlparse-0.4.4-150400.6.4.2
* python311-google-cloud-core-2.4.1-150400.5.4.1
* python311-certifi-2023.7.22-150400.12.6.2
* python311-pyOpenSSL-23.2.0-150400.3.10.1
* python311-google-cloud-spanner-3.40.1-150400.9.3.1
* python311-charset-normalizer-3.1.0-150400.9.7.2
* python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1
* python311-grpcio-status-1.60.1-150400.9.3.1
* python311-py-1.11.0-150400.12.7.2
* python311-proto-plus-1.23.0-150400.9.3.1
* python311-cachetools-5.3.1-150400.8.6.1
* python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1
* python311-setuptools-67.7.2-150400.3.12.1
* python311-pycparser-2.21-150400.12.7.2
* python311-google-cloud-secret-manager-2.17.0-150400.9.3.1
* python311-google-cloud-storage-2.14.0-150400.10.3.1
* python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1
* python311-google-cloud-iam-2.13.0-150400.9.3.1
* python311-google-api-core-2.15.0-150400.5.4.1
* python311-pyasn1-0.5.0-150400.12.7.2
* python311-urllib3-2.0.7-150400.7.14.1
* python311-idna-3.4-150400.11.6.1
* python311-google-cloud-service-directory-1.11.1-150400.9.3.1
* python311-pyasn1-modules-0.3.0-150400.12.7.1
* python311-google-cloud-run-0.10.1-150400.9.3.1
* python311-google-cloud-audit-log-0.2.5-150400.9.3.1
* python311-google-cloud-domains-1.7.1-150400.9.3.1
* python311-googleapis-common-protos-1.62.0-150400.10.4.1
* python311-google-auth-2.27.0-150400.6.7.1
* python311-iniconfig-2.0.0-150400.10.6.1
* python311-setuptools-wheel-67.7.2-150400.3.12.1
* python311-google-cloud-compute-1.15.0-150400.9.3.1
* python311-requests-2.31.0-150400.6.8.1
* python311-google-cloud-build-3.22.0-150400.9.3.1
* python311-rsa-4.9-150400.12.7.1
* python311-google-cloud-kms-2.21.0-150400.9.3.1
* python311-google-cloud-logging-3.9.0-150400.9.3.1
* python311-google-cloud-vpc-access-1.10.0-150400.9.3.1
* python311-grpc-google-iam-v1-0.13.0-150400.9.3.1
* python311-apipkg-3.0.1-150400.12.6.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libprotobuf-lite25_1_0-64bit-25.1-150400.9.6.1
* libprotoc25_1_0-64bit-25.1-150400.9.6.1
* libprotobuf25_1_0-64bit-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150400.9.6.1
* libprotoc25_1_0-64bit-debuginfo-25.1-150400.9.6.1
* libprotobuf25_1_0-64bit-debuginfo-25.1-150400.9.6.1
* openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-grpcio-1.60.1-150400.9.7.2
* python311-grpcio-debuginfo-1.60.1-150400.9.7.2
* protobuf-devel-debuginfo-25.1-150400.9.6.1
* python311-cryptography-debuginfo-41.0.3-150400.16.19.1
* protobuf-debugsource-25.1-150400.9.6.1
* protobuf-java-25.1-150400.9.6.1
* protobuf-devel-25.1-150400.9.6.1
* libprotoc25_1_0-25.1-150400.9.6.1
* python311-google-crc32c-1.5.0-150400.9.3.1
* python311-cryptography-41.0.3-150400.16.19.1
* libcrc32c-devel-1.1.2-150400.9.3.1
* libcrc32c1-debuginfo-1.1.2-150400.9.3.1
* python311-protobuf-4.25.1-150400.9.6.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* libcrc32c-debugsource-1.1.2-150400.9.3.1
* python-cryptography-debugsource-41.0.3-150400.16.19.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.6.1
* python-google-crc32c-debugsource-1.5.0-150400.9.3.1
* libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1
* python311-cffi-1.15.1-150400.8.7.2
* python-cffi-debugsource-1.15.1-150400.8.7.2
* python-grpcio-debugsource-1.60.1-150400.9.7.2
* python311-cffi-debuginfo-1.15.1-150400.8.7.2
* libcrc32c1-1.1.2-150400.9.3.1
* openSUSE Leap 15.5 (x86_64)
* libprotobuf25_1_0-32bit-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-32bit-25.1-150400.9.6.1
* libprotoc25_1_0-32bit-25.1-150400.9.6.1
* openSUSE Leap 15.5 (noarch)
* python311-pytz-2023.3-150400.6.6.1
* python311-google-cloud-dns-0.35.0-150400.9.3.1
* python311-google-resumable-media-2.7.0-150400.10.4.1
* python311-sqlparse-0.4.4-150400.6.4.2
* python311-google-cloud-core-2.4.1-150400.5.4.1
* python311-certifi-2023.7.22-150400.12.6.2
* python311-pyOpenSSL-23.2.0-150400.3.10.1
* python311-google-cloud-spanner-3.40.1-150400.9.3.1
* python311-charset-normalizer-3.1.0-150400.9.7.2
* python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1
* python311-grpcio-status-1.60.1-150400.9.3.1
* python311-py-1.11.0-150400.12.7.2
* python311-proto-plus-1.23.0-150400.9.3.1
* python311-cachetools-5.3.1-150400.8.6.1
* python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1
* python311-setuptools-67.7.2-150400.3.12.1
* python311-pycparser-2.21-150400.12.7.2
* python311-google-cloud-secret-manager-2.17.0-150400.9.3.1
* python311-google-cloud-storage-2.14.0-150400.10.3.1
* python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1
* python311-google-cloud-iam-2.13.0-150400.9.3.1
* python311-google-api-core-2.15.0-150400.5.4.1
* python311-pyasn1-0.5.0-150400.12.7.2
* python311-urllib3-2.0.7-150400.7.14.1
* python311-idna-3.4-150400.11.6.1
* python311-google-cloud-service-directory-1.11.1-150400.9.3.1
* python311-pyasn1-modules-0.3.0-150400.12.7.1
* python311-google-cloud-run-0.10.1-150400.9.3.1
* python311-google-cloud-audit-log-0.2.5-150400.9.3.1
* python311-google-cloud-domains-1.7.1-150400.9.3.1
* python311-googleapis-common-protos-1.62.0-150400.10.4.1
* python311-google-auth-2.27.0-150400.6.7.1
* python311-iniconfig-2.0.0-150400.10.6.1
* python311-google-cloud-compute-1.15.0-150400.9.3.1
* python311-requests-2.31.0-150400.6.8.1
* python311-google-cloud-build-3.22.0-150400.9.3.1
* python311-rsa-4.9-150400.12.7.1
* python311-google-cloud-kms-2.21.0-150400.9.3.1
* python311-google-cloud-logging-3.9.0-150400.9.3.1
* python311-google-cloud-vpc-access-1.10.0-150400.9.3.1
* python311-grpc-google-iam-v1-0.13.0-150400.9.3.1
* python311-apipkg-3.0.1-150400.12.6.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Manager Proxy 4.3 (x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* protobuf-debugsource-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libprotobuf-lite25_1_0-25.1-150400.9.6.1
* libprotobuf25_1_0-25.1-150400.9.6.1
* libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.6.1
* libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1
* protobuf-debugsource-25.1-150400.9.6.1
* libprotoc25_1_0-25.1-150400.9.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libprotoc25_1_0-debuginfo-25.1-150400.9.6.1
* protobuf-devel-debuginfo-25.1-150400.9.6.1
* libprotoc25_1_0-25.1-150400.9.6.1
* protobuf-debugsource-25.1-150400.9.6.1
* protobuf-devel-25.1-150400.9.6.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* protobuf-debugsource-25.1-150400.9.6.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1
* libcrc32c-debugsource-1.1.2-150400.9.3.1
* python311-cffi-1.15.1-150400.8.7.2
* python311-google-crc32c-1.5.0-150400.9.3.1
* python311-grpcio-1.60.1-150400.9.7.2
* python311-grpcio-debuginfo-1.60.1-150400.9.7.2
* python311-cryptography-41.0.3-150400.16.19.1
* libcrc32c-devel-1.1.2-150400.9.3.1
* libcrc32c1-debuginfo-1.1.2-150400.9.3.1
* python-grpcio-debugsource-1.60.1-150400.9.7.2
* python-google-crc32c-debugsource-1.5.0-150400.9.3.1
* python311-protobuf-4.25.1-150400.9.6.1
* protobuf-debugsource-25.1-150400.9.6.1
* libcrc32c1-1.1.2-150400.9.3.1
* Public Cloud Module 15-SP4 (noarch)
* python311-pytz-2023.3-150400.6.6.1
* python311-google-cloud-dns-0.35.0-150400.9.3.1
* python311-google-resumable-media-2.7.0-150400.10.4.1
* python311-sqlparse-0.4.4-150400.6.4.2
* python311-google-cloud-core-2.4.1-150400.5.4.1
* python311-certifi-2023.7.22-150400.12.6.2
* python311-pyOpenSSL-23.2.0-150400.3.10.1
* python311-google-cloud-spanner-3.40.1-150400.9.3.1
* python311-charset-normalizer-3.1.0-150400.9.7.2
* python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1
* python311-grpcio-status-1.60.1-150400.9.3.1
* python311-py-1.11.0-150400.12.7.2
* python311-proto-plus-1.23.0-150400.9.3.1
* python311-cachetools-5.3.1-150400.8.6.1
* python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1
* python311-setuptools-67.7.2-150400.3.12.1
* python311-pycparser-2.21-150400.12.7.2
* python311-google-cloud-secret-manager-2.17.0-150400.9.3.1
* python311-google-cloud-storage-2.14.0-150400.10.3.1
* python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1
* python311-google-cloud-iam-2.13.0-150400.9.3.1
* python311-google-api-core-2.15.0-150400.5.4.1
* python311-pyasn1-0.5.0-150400.12.7.2
* python311-urllib3-2.0.7-150400.7.14.1
* python311-idna-3.4-150400.11.6.1
* python311-google-cloud-service-directory-1.11.1-150400.9.3.1
* python311-pyasn1-modules-0.3.0-150400.12.7.1
* python311-google-cloud-run-0.10.1-150400.9.3.1
* python311-google-cloud-audit-log-0.2.5-150400.9.3.1
* python311-google-cloud-domains-1.7.1-150400.9.3.1
* python311-googleapis-common-protos-1.62.0-150400.10.4.1
* python311-google-auth-2.27.0-150400.6.7.1
* python311-iniconfig-2.0.0-150400.10.6.1
* python311-google-cloud-compute-1.15.0-150400.9.3.1
* python311-requests-2.31.0-150400.6.8.1
* python311-google-cloud-build-3.22.0-150400.9.3.1
* python311-rsa-4.9-150400.12.7.1
* python311-google-cloud-kms-2.21.0-150400.9.3.1
* python311-google-cloud-logging-3.9.0-150400.9.3.1
* python311-google-cloud-vpc-access-1.10.0-150400.9.3.1
* python311-grpc-google-iam-v1-0.13.0-150400.9.3.1
* python311-apipkg-3.0.1-150400.12.6.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1
* libcrc32c-debugsource-1.1.2-150400.9.3.1
* python311-google-crc32c-1.5.0-150400.9.3.1
* python311-grpcio-1.60.1-150400.9.7.2
* python311-grpcio-debuginfo-1.60.1-150400.9.7.2
* libcrc32c-devel-1.1.2-150400.9.3.1
* libcrc32c1-debuginfo-1.1.2-150400.9.3.1
* libprotoc25_1_0-debuginfo-25.1-150400.9.6.1
* python-google-crc32c-debugsource-1.5.0-150400.9.3.1
* python-grpcio-debugsource-1.60.1-150400.9.7.2
* protobuf-debugsource-25.1-150400.9.6.1
* libcrc32c1-1.1.2-150400.9.3.1
* libprotoc25_1_0-25.1-150400.9.6.1
* Public Cloud Module 15-SP5 (noarch)
* python311-google-cloud-dns-0.35.0-150400.9.3.1
* python311-google-resumable-media-2.7.0-150400.10.4.1
* python311-sqlparse-0.4.4-150400.6.4.2
* python311-google-cloud-core-2.4.1-150400.5.4.1
* python311-google-cloud-spanner-3.40.1-150400.9.3.1
* python311-grpcio-status-1.60.1-150400.9.3.1
* python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1
* python311-proto-plus-1.23.0-150400.9.3.1
* python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1
* python311-google-cloud-secret-manager-2.17.0-150400.9.3.1
* python311-google-cloud-storage-2.14.0-150400.10.3.1
* python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1
* python311-google-cloud-iam-2.13.0-150400.9.3.1
* python311-google-api-core-2.15.0-150400.5.4.1
* python311-google-cloud-service-directory-1.11.1-150400.9.3.1
* python311-google-cloud-run-0.10.1-150400.9.3.1
* python311-google-cloud-audit-log-0.2.5-150400.9.3.1
* python311-google-cloud-domains-1.7.1-150400.9.3.1
* python311-googleapis-common-protos-1.62.0-150400.10.4.1
* python311-google-auth-2.27.0-150400.6.7.1
* python311-google-cloud-compute-1.15.0-150400.9.3.1
* python311-google-cloud-build-3.22.0-150400.9.3.1
* python311-google-cloud-kms-2.21.0-150400.9.3.1
* python311-google-cloud-logging-3.9.0-150400.9.3.1
* python311-google-cloud-vpc-access-1.10.0-150400.9.3.1
* python311-grpc-google-iam-v1-0.13.0-150400.9.3.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-cryptography-debuginfo-41.0.3-150400.16.19.1
* python311-cffi-1.15.1-150400.8.7.2
* python311-grpcio-1.60.1-150400.9.7.2
* python311-grpcio-debuginfo-1.60.1-150400.9.7.2
* python311-cryptography-41.0.3-150400.16.19.1
* python-cffi-debugsource-1.15.1-150400.8.7.2
* python-grpcio-debugsource-1.60.1-150400.9.7.2
* python311-cffi-debuginfo-1.15.1-150400.8.7.2
* python-cryptography-debugsource-41.0.3-150400.16.19.1
* python311-protobuf-4.25.1-150400.9.6.1
* Python 3 Module 15-SP5 (noarch)
* python311-charset-normalizer-3.1.0-150400.9.7.2
* python311-iniconfig-2.0.0-150400.10.6.1
* python311-pytz-2023.3-150400.6.6.1
* python311-pyasn1-0.5.0-150400.12.7.2
* python311-urllib3-2.0.7-150400.7.14.1
* python311-requests-2.31.0-150400.6.8.1
* python311-rsa-4.9-150400.12.7.1
* python311-cachetools-5.3.1-150400.8.6.1
* python311-idna-3.4-150400.11.6.1
* python311-pyasn1-modules-0.3.0-150400.12.7.1
* python311-setuptools-67.7.2-150400.3.12.1
* python311-pycparser-2.21-150400.12.7.2
* python311-pyOpenSSL-23.2.0-150400.3.10.1
* python311-certifi-2023.7.22-150400.12.6.2
* python311-apipkg-3.0.1-150400.12.6.1
* python311-py-1.11.0-150400.12.7.2
* python311-google-auth-2.27.0-150400.6.7.1
## References:
* https://www.suse.com/security/cve/CVE-2023-30608.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210617
* https://jira.suse.com/browse/PED-6697
* https://jira.suse.com/browse/PED-7987
1
0
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1642-1
Rating: important
References:
* bsc#1190576
* bsc#1192145
* bsc#1200313
* bsc#1201489
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1211592
* bsc#1218562
* bsc#1218917
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220513
* bsc#1220755
* bsc#1220854
* bsc#1221113
* bsc#1221299
* bsc#1221543
* bsc#1221545
* bsc#1222449
* bsc#1222482
* bsc#1222503
* bsc#1222559
* bsc#1222585
* bsc#1222624
* bsc#1222666
* bsc#1222669
* bsc#1222709
* bsc#1222790
* bsc#1222792
* bsc#1222829
* bsc#1222876
* bsc#1222878
* bsc#1222881
* bsc#1222883
* bsc#1222894
* bsc#1222976
* bsc#1223016
* bsc#1223057
* bsc#1223111
* bsc#1223187
* bsc#1223202
* bsc#1223475
* bsc#1223482
* bsc#1223509
* bsc#1223513
* bsc#1223522
* bsc#1223824
* bsc#1223921
* bsc#1223923
* bsc#1223931
* bsc#1223941
* bsc#1223948
* bsc#1223952
* bsc#1223963
Cross-References:
* CVE-2021-46955
* CVE-2021-47041
* CVE-2021-47074
* CVE-2021-47113
* CVE-2021-47131
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47194
* CVE-2021-47198
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47212
* CVE-2021-47216
* CVE-2022-48631
* CVE-2022-48638
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48654
* CVE-2022-48672
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48693
* CVE-2022-48695
* CVE-2022-48701
* CVE-2022-48702
* CVE-2023-2860
* CVE-2023-6270
* CVE-2024-0639
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26744
* CVE-2024-26816
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26862
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-26906
* CVE-2024-27043
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48686 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 48 vulnerabilities and has eight security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second
ref (bsc#1221543).
* CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up
(bsc#1221545).
* CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220513).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
== 0 and eh_depth > 0 (bsc#1223475).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault()
(bsc#1223202).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2021-47041: Don't set sk_user_data without write_lock (bsc#1220755).
* CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
* CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid
parameter in rdma/srpt (bsc#1222449).
The following non-security bugs were fixed:
* dm rq: do not queue request to blk-mq during DM suspend (bsc#1221113).
* dm: rearrange core declarations for extended use from dm-zone.c
(bsc#1221113).
* net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
* tls: Fix context leak on tls_device_down (bsc#1221545).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1642=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1642=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-1642=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1642=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1642=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1642=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1642=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1642=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1642=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1642=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* openSUSE Leap 15.3 (noarch)
* kernel-macros-5.3.18-150300.59.161.1
* kernel-docs-html-5.3.18-150300.59.161.2
* kernel-devel-5.3.18-150300.59.161.1
* kernel-source-vanilla-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.161.1
* kernel-debug-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-debug-livepatch-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-devel-5.3.18-150300.59.161.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-debug-debuginfo-5.3.18-150300.59.161.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.161.1
* kernel-debug-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.161.1
* kernel-debug-debugsource-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* gfs2-kmp-default-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-livepatch-devel-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-base-rebuild-5.3.18-150300.59.161.1.150300.18.94.1
* ocfs2-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-default-5.3.18-150300.59.161.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-optional-5.3.18-150300.59.161.1
* kernel-default-extra-5.3.18-150300.59.161.1
* kernel-default-livepatch-5.3.18-150300.59.161.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.161.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-5.3.18-150300.59.161.1
* kselftests-kmp-default-5.3.18-150300.59.161.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* kernel-obs-qa-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
* kernel-livepatch-SLE15-SP3_Update_44-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_161-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kernel-preempt-livepatch-devel-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-preempt-optional-5.3.18-150300.59.161.1
* ocfs2-kmp-preempt-5.3.18-150300.59.161.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-extra-5.3.18-150300.59.161.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.161.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kselftests-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.161.1
* reiserfs-kmp-preempt-5.3.18-150300.59.161.1
* dlm-kmp-preempt-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.161.1
* kernel-zfcpdump-debugsource-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64)
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-optional-5.3.18-150300.59.161.1
* ocfs2-kmp-64kb-5.3.18-150300.59.161.1
* dlm-kmp-64kb-5.3.18-150300.59.161.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-64kb-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* dtb-nvidia-5.3.18-150300.59.161.1
* dtb-socionext-5.3.18-150300.59.161.1
* dtb-amd-5.3.18-150300.59.161.1
* dtb-altera-5.3.18-150300.59.161.1
* dtb-arm-5.3.18-150300.59.161.1
* dtb-qcom-5.3.18-150300.59.161.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.161.1
* dtb-lg-5.3.18-150300.59.161.1
* dtb-al-5.3.18-150300.59.161.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-hisilicon-5.3.18-150300.59.161.1
* reiserfs-kmp-64kb-5.3.18-150300.59.161.1
* kselftests-kmp-64kb-5.3.18-150300.59.161.1
* dtb-xilinx-5.3.18-150300.59.161.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.161.1
* dtb-zte-5.3.18-150300.59.161.1
* dtb-freescale-5.3.18-150300.59.161.1
* dtb-allwinner-5.3.18-150300.59.161.1
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* gfs2-kmp-64kb-5.3.18-150300.59.161.1
* dtb-cavium-5.3.18-150300.59.161.1
* dtb-sprd-5.3.18-150300.59.161.1
* dtb-rockchip-5.3.18-150300.59.161.1
* kernel-64kb-extra-5.3.18-150300.59.161.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.161.1
* dtb-amlogic-5.3.18-150300.59.161.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* dtb-renesas-5.3.18-150300.59.161.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-broadcom-5.3.18-150300.59.161.1
* dtb-apm-5.3.18-150300.59.161.1
* dtb-mediatek-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-exynos-5.3.18-150300.59.161.1
* dtb-marvell-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-livepatch-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* dlm-kmp-default-5.3.18-150300.59.161.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-default-5.3.18-150300.59.161.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-default-5.3.18-150300.59.161.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.161.1
* ocfs2-kmp-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-default-5.3.18-150300.59.161.1
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.161.1
* kernel-zfcpdump-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-default-5.3.18-150300.59.161.1
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47041.html
* https://www.suse.com/security/cve/CVE-2021-47074.html
* https://www.suse.com/security/cve/CVE-2021-47113.html
* https://www.suse.com/security/cve/CVE-2021-47131.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26744.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220513
* https://bugzilla.suse.com/show_bug.cgi?id=1220755
* https://bugzilla.suse.com/show_bug.cgi?id=1220854
* https://bugzilla.suse.com/show_bug.cgi?id=1221113
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221543
* https://bugzilla.suse.com/show_bug.cgi?id=1221545
* https://bugzilla.suse.com/show_bug.cgi?id=1222449
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
1
0
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1647-1
Rating: important
References:
* bsc#1190576
* bsc#1192145
* bsc#1192354
* bsc#1192837
* bsc#1193629
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1206881
* bsc#1209657
* bsc#1215221
* bsc#1216223
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1219104
* bsc#1219126
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220703
* bsc#1220761
* bsc#1220883
* bsc#1221044
* bsc#1221061
* bsc#1221088
* bsc#1221293
* bsc#1221299
* bsc#1221612
* bsc#1221830
* bsc#1222117
* bsc#1222422
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222503
* bsc#1222536
* bsc#1222559
* bsc#1222585
* bsc#1222618
* bsc#1222624
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222706
* bsc#1222709
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222796
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1223016
* bsc#1223187
* bsc#1223380
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223479
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223522
* bsc#1223523
* bsc#1223705
* bsc#1223824
Cross-References:
* CVE-2021-47047
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2023-0160
* CVE-2023-52476
* CVE-2023-52500
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52607
* CVE-2023-52616
* CVE-2023-52628
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26614
* CVE-2024-26642
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26704
* CVE-2024-26727
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26773
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-27043
* CVE-2024-27389
CVSS scores:
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves 87 vulnerabilities and has 12 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
(bsc#1222790).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
The following non-security bugs were fixed:
* Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
* ibmvfc: make 'max_sectors' a module option (bsc#1216223).
* scsi: Update max_hw_sectors on rescan (bsc#1216223).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1647=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1647=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1647=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1647=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1647=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1647=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26727.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1192354
* https://bugzilla.suse.com/show_bug.cgi?id=1192837
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1206881
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222536
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
1
0
SUSE-RU-2024:1631-1: moderate: Recommended update for python-argcomplete and python-Twisted
by OPENSUSE-UPDATES 14 May '24
by OPENSUSE-UPDATES 14 May '24
14 May '24
# Recommended update for python-argcomplete and python-Twisted
Announcement ID: SUSE-RU-2024:1631-1
Rating: moderate
References:
* bsc#1224109
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for python-argcomplete and python-Twisted fixes the following issue:
* Fix update-alternatives (bsc#1224109)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1631=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1631=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1631=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1631=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1631=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1631=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1631=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1631=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1631=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1631=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1631=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1631=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1631=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1631=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1631=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1631=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1631=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1631=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1631=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1631=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1631=1
## Package List:
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Manager Server 4.3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Enterprise Storage 7.1 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python3-Twisted-22.2.0-150400.18.1
* python-Twisted-doc-22.2.0-150400.18.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-Twisted-22.2.0-150400.18.1
* openSUSE Leap 15.5 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* Basesystem Module 15-SP5 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* Basesystem Module 15-SP6 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-Twisted-22.2.0-150400.18.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
* SUSE Manager Proxy 4.3 (x86_64)
* python3-Twisted-22.2.0-150400.18.1
* SUSE Manager Proxy 4.3 (noarch)
* python3-argcomplete-1.9.2-150000.3.8.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224109
1
0