openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2024
- 3 participants
- 344 discussions
16 Sep '24
# Recommended update for rmt-server
Announcement ID: SUSE-RU-2024:3260-1
Rating: important
References:
Affected Products:
* openSUSE Leap 15.3
* Public Cloud Module 15-SP3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that can now be installed.
## Description:
This update for rmt-server contains the following fixes:
* Version 2.19
* Fix for mirroring products that contain special characters (eg.: '$') in
their path
* rmt-server-pubcloud:
* Support registration of extensions in BYOS mode on top of a PAYG system (hybrid mode) (jsc#PCT-400)
* Validate repository and registy access for hybrid systems
* Include new script to fix yum-utils issue (jsc#SLL-369)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3260=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3260=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3260=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3260=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* rmt-server-2.19-150300.3.43.3
* rmt-server-pubcloud-2.19-150300.3.43.3
* rmt-server-config-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* rmt-server-pubcloud-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* rmt-server-2.19-150300.3.43.3
* rmt-server-config-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* rmt-server-2.19-150300.3.43.3
* rmt-server-config-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* rmt-server-2.19-150300.3.43.3
* rmt-server-config-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* rmt-server-2.19-150300.3.43.3
* rmt-server-config-2.19-150300.3.43.3
* rmt-server-debuginfo-2.19-150300.3.43.3
* rmt-server-debugsource-2.19-150300.3.43.3
1
0
openSUSE-SU-2024:0302-1: important: Security update for chromium
by opensuse-security@opensuse.org 16 Sep '24
by opensuse-security@opensuse.org 16 Sep '24
16 Sep '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0302-1
Rating: important
References: #1230391
Cross-References: CVE-2024-8636 CVE-2024-8637 CVE-2024-8638
CVE-2024-8639
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 128.0.6613.137 (released 2024-09-10) (boo#1230391)
* CVE-2024-8636: Heap buffer overflow in Skia
* CVE-2024-8637: Use after free in Media Router
* CVE-2024-8638: Type Confusion in V8
* CVE-2024-8639: Use after free in Autofill
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-302=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-302=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-128.0.6613.137-bp156.2.26.1
chromedriver-debuginfo-128.0.6613.137-bp156.2.26.1
chromium-128.0.6613.137-bp156.2.26.1
chromium-debuginfo-128.0.6613.137-bp156.2.26.1
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-128.0.6613.137-bp155.2.114.1
chromium-128.0.6613.137-bp155.2.114.1
References:
https://www.suse.com/security/cve/CVE-2024-8636.html
https://www.suse.com/security/cve/CVE-2024-8637.html
https://www.suse.com/security/cve/CVE-2024-8638.html
https://www.suse.com/security/cve/CVE-2024-8639.html
https://bugzilla.suse.com/1230391
1
0
16 Sep '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3249-1
Rating: important
References:
* bsc#1176447
* bsc#1195668
* bsc#1195928
* bsc#1195957
* bsc#1196018
* bsc#1196516
* bsc#1196823
* bsc#1202346
* bsc#1209636
* bsc#1209799
* bsc#1210629
* bsc#1216834
* bsc#1220185
* bsc#1220186
* bsc#1222251
* bsc#1222728
* bsc#1223948
* bsc#1225109
* bsc#1225584
* bsc#1227832
* bsc#1227924
* bsc#1227928
* bsc#1227932
* bsc#1227935
* bsc#1227941
* bsc#1227942
* bsc#1227945
* bsc#1227952
* bsc#1227964
* bsc#1227969
* bsc#1227985
* bsc#1227987
* bsc#1227988
* bsc#1227989
* bsc#1227997
* bsc#1228000
* bsc#1228002
* bsc#1228004
* bsc#1228005
* bsc#1228006
* bsc#1228015
* bsc#1228020
* bsc#1228037
* bsc#1228045
* bsc#1228060
* bsc#1228062
* bsc#1228066
* bsc#1228114
* bsc#1228516
* bsc#1228576
* bsc#1228959
* bsc#1229400
* bsc#1229454
* bsc#1229500
* bsc#1229503
* bsc#1229510
* bsc#1229512
* bsc#1229598
* bsc#1229604
* bsc#1229607
* bsc#1229620
* bsc#1229621
* bsc#1229624
* bsc#1229626
* bsc#1229629
* bsc#1229630
* bsc#1229637
* bsc#1229641
* bsc#1229657
* bsc#1229707
Cross-References:
* CVE-2021-4441
* CVE-2022-0854
* CVE-2022-20368
* CVE-2022-28748
* CVE-2022-2964
* CVE-2022-48686
* CVE-2022-48775
* CVE-2022-48778
* CVE-2022-48787
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48798
* CVE-2022-48802
* CVE-2022-48805
* CVE-2022-48811
* CVE-2022-48823
* CVE-2022-48824
* CVE-2022-48827
* CVE-2022-48834
* CVE-2022-48835
* CVE-2022-48836
* CVE-2022-48837
* CVE-2022-48838
* CVE-2022-48839
* CVE-2022-48843
* CVE-2022-48851
* CVE-2022-48853
* CVE-2022-48856
* CVE-2022-48857
* CVE-2022-48858
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48901
* CVE-2022-48905
* CVE-2022-48912
* CVE-2022-48917
* CVE-2022-48919
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48928
* CVE-2022-48930
* CVE-2022-48933
* CVE-2022-48934
* CVE-2023-1582
* CVE-2023-2176
* CVE-2023-52854
* CVE-2024-26583
* CVE-2024-26584
* CVE-2024-26800
* CVE-2024-40910
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41062
* CVE-2024-42077
* CVE-2024-42232
* CVE-2024-42271
* CVE-2024-43861
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-44947
CVSS scores:
* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48778 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 62 vulnerabilities and has eight security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2022-48919: Fix double free race when mount fails in cifs_get_root()
(bsc#1229657).
* CVE-2023-52854: Fix refcnt handling in padata_free_shell() (bsc#1225584).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2022-48872: Fix use-after-free race condition for maps (bsc#1229510).
* CVE-2022-48873: Do not remove map on creater_process and device_release
(bsc#1229512).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
* CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
* CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)
The following non-security bugs were fixed:
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* powerpc: Remove support for PowerPC 601 (Remove unused and malformed
assembly causing build error).
* sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799
bsc#1225109).
* scsi: pm80xx: Fix TMF task completion race condition (bsc#1228002).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3249=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3249=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3249=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3249=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3249=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3249=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3249=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3249=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (noarch)
* kernel-source-vanilla-5.3.18-150300.59.174.1
* kernel-docs-html-5.3.18-150300.59.174.1
* kernel-source-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-debug-5.3.18-150300.59.174.1
* kernel-kvmsmall-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-debug-debugsource-5.3.18-150300.59.174.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-debug-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.174.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.174.1
* kernel-kvmsmall-devel-5.3.18-150300.59.174.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.174.1
* kernel-debug-livepatch-devel-5.3.18-150300.59.174.1
* kernel-debug-devel-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-default-livepatch-5.3.18-150300.59.174.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-default-optional-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* kernel-default-livepatch-devel-5.3.18-150300.59.174.1
* gfs2-kmp-default-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-obs-qa-5.3.18-150300.59.174.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-default-5.3.18-150300.59.174.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-extra-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* ocfs2-kmp-default-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-devel-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-5.3.18-150300.59.174.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.174.1
* kselftests-kmp-default-5.3.18-150300.59.174.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-rebuild-5.3.18-150300.59.174.1.150300.18.103.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-1-150300.7.3.1
* kernel-livepatch-SLE15-SP3_Update_48-debugsource-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_174-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-extra-5.3.18-150300.59.174.1
* kernel-preempt-livepatch-devel-5.3.18-150300.59.174.1
* kernel-preempt-optional-5.3.18-150300.59.174.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* gfs2-kmp-preempt-5.3.18-150300.59.174.1
* kselftests-kmp-preempt-5.3.18-150300.59.174.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-preempt-5.3.18-150300.59.174.1
* ocfs2-kmp-preempt-5.3.18-150300.59.174.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-preempt-5.3.18-150300.59.174.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.174.1
* reiserfs-kmp-preempt-5.3.18-150300.59.174.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64)
* dtb-socionext-5.3.18-150300.59.174.1
* kernel-64kb-extra-5.3.18-150300.59.174.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-freescale-5.3.18-150300.59.174.1
* dtb-lg-5.3.18-150300.59.174.1
* kernel-64kb-optional-5.3.18-150300.59.174.1
* dtb-zte-5.3.18-150300.59.174.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-apm-5.3.18-150300.59.174.1
* dtb-al-5.3.18-150300.59.174.1
* cluster-md-kmp-64kb-5.3.18-150300.59.174.1
* reiserfs-kmp-64kb-5.3.18-150300.59.174.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* dtb-renesas-5.3.18-150300.59.174.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.174.1
* dtb-exynos-5.3.18-150300.59.174.1
* kselftests-kmp-64kb-5.3.18-150300.59.174.1
* dtb-sprd-5.3.18-150300.59.174.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-allwinner-5.3.18-150300.59.174.1
* dtb-marvell-5.3.18-150300.59.174.1
* dtb-cavium-5.3.18-150300.59.174.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-rockchip-5.3.18-150300.59.174.1
* dtb-arm-5.3.18-150300.59.174.1
* gfs2-kmp-64kb-5.3.18-150300.59.174.1
* dlm-kmp-64kb-5.3.18-150300.59.174.1
* dtb-xilinx-5.3.18-150300.59.174.1
* dtb-mediatek-5.3.18-150300.59.174.1
* dtb-amd-5.3.18-150300.59.174.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.174.1
* ocfs2-kmp-64kb-5.3.18-150300.59.174.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* dtb-altera-5.3.18-150300.59.174.1
* dtb-broadcom-5.3.18-150300.59.174.1
* dtb-nvidia-5.3.18-150300.59.174.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.174.1
* dtb-hisilicon-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* dtb-qcom-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* dtb-amlogic-5.3.18-150300.59.174.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-livepatch-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.3.18-150300.59.174.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1
* dlm-kmp-default-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1
* cluster-md-kmp-default-5.3.18-150300.59.174.1
* ocfs2-kmp-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-64kb-debugsource-5.3.18-150300.59.174.1
* kernel-64kb-devel-5.3.18-150300.59.174.1
* kernel-64kb-debuginfo-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.174.1
* kernel-default-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-5.3.18-150300.59.174.1
* kernel-obs-build-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-debuginfo-5.3.18-150300.59.174.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.174.1
* kernel-syms-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* kernel-obs-build-5.3.18-150300.59.174.1
* kernel-preempt-debugsource-5.3.18-150300.59.174.1
* kernel-preempt-devel-5.3.18-150300.59.174.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-source-5.3.18-150300.59.174.1
* kernel-devel-5.3.18-150300.59.174.1
* kernel-macros-5.3.18-150300.59.174.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.174.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.174.1
* kernel-default-debugsource-5.3.18-150300.59.174.1
## References:
* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-20368.html
* https://www.suse.com/security/cve/CVE-2022-28748.html
* https://www.suse.com/security/cve/CVE-2022-2964.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48778.html
* https://www.suse.com/security/cve/CVE-2022-48787.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48798.html
* https://www.suse.com/security/cve/CVE-2022-48802.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48824.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48834.html
* https://www.suse.com/security/cve/CVE-2022-48835.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48837.html
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48843.html
* https://www.suse.com/security/cve/CVE-2022-48851.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-48856.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48858.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48901.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48933.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2023-1582.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2024-26583.html
* https://www.suse.com/security/cve/CVE-2024-26584.html
* https://www.suse.com/security/cve/CVE-2024-26800.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1176447
* https://bugzilla.suse.com/show_bug.cgi?id=1195668
* https://bugzilla.suse.com/show_bug.cgi?id=1195928
* https://bugzilla.suse.com/show_bug.cgi?id=1195957
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1209636
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220185
* https://bugzilla.suse.com/show_bug.cgi?id=1220186
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222728
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227932
* https://bugzilla.suse.com/show_bug.cgi?id=1227935
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227942
* https://bugzilla.suse.com/show_bug.cgi?id=1227945
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227964
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227987
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1227997
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228004
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228006
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228060
* https://bugzilla.suse.com/show_bug.cgi?id=1228062
* https://bugzilla.suse.com/show_bug.cgi?id=1228066
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229607
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229621
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
1
0
16 Sep '24
# Security update for wireshark
Announcement ID: SUSE-SU-2024:3250-1
Rating: moderate
References:
* bsc#1229907
* bsc#1230372
Cross-References:
* CVE-2024-8250
* CVE-2024-8645
CVSS scores:
* CVE-2024-8250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-8645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for wireshark fixes the following issues:
* CVE-2024-8250: Fixed NTLMSSP dissector crash (bsc#1229907).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3250=1 openSUSE-SLE-15.6-2024-3250=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3250=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3250=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwiretap14-debuginfo-4.2.7-150600.18.11.1
* libwireshark17-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-4.2.7-150600.18.11.1
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* libwireshark17-4.2.7-150600.18.11.1
* wireshark-devel-4.2.7-150600.18.11.1
* wireshark-4.2.7-150600.18.11.1
* libwiretap14-4.2.7-150600.18.11.1
* wireshark-ui-qt-debuginfo-4.2.7-150600.18.11.1
* wireshark-ui-qt-4.2.7-150600.18.11.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libwiretap14-debuginfo-4.2.7-150600.18.11.1
* libwireshark17-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-debuginfo-4.2.7-150600.18.11.1
* libwsutil15-4.2.7-150600.18.11.1
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* libwireshark17-4.2.7-150600.18.11.1
* wireshark-4.2.7-150600.18.11.1
* libwiretap14-4.2.7-150600.18.11.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wireshark-debuginfo-4.2.7-150600.18.11.1
* wireshark-debugsource-4.2.7-150600.18.11.1
* wireshark-devel-4.2.7-150600.18.11.1
* wireshark-ui-qt-debuginfo-4.2.7-150600.18.11.1
* wireshark-ui-qt-4.2.7-150600.18.11.1
## References:
* https://www.suse.com/security/cve/CVE-2024-8250.html
* https://www.suse.com/security/cve/CVE-2024-8645.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229907
* https://bugzilla.suse.com/show_bug.cgi?id=1230372
1
0
SUSE-RU-2024:3245-1: moderate: Recommended update for maven, maven-resolver, sbt, xmvn
by OPENSUSE-UPDATES 16 Sep '24
by OPENSUSE-UPDATES 16 Sep '24
16 Sep '24
# Recommended update for maven, maven-resolver, sbt, xmvn
Announcement ID: SUSE-RU-2024:3245-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for maven, maven-resolver, sbt, xmvn fixes the following issues:
maven-resolver was upgraded to version 1.9.22:
* Bugs fixed:
* Resolver-Supplier unusable in OSGi runtimes
* Invalid Cookie set under proxy conditions
* In typical setups, DefaultArtifact copies the same maps over and over again
* Memory consumption improvements
* New Features:
* Import o.e.aether packages with the exact same version in OSGi metadata
* Improvements:
* Removed excessive strictness of OSGi dependency metadata
maven was upgraded to version 3.9.9:
* Bugs fixed:
* Fixed search for topDirectory when using -f / --file for Maven 3.9.x
* Fixed Maven not finding extensions for -f when current dir is root
* Fixed warning for com.sun:tools:jar that refers to a non-existing file
* Fixed profile activation based on OS properties for "mvn site"
* Fixed Resolver wrongly assuming it is deploying a plugin by presence of
META-INF/maven/plugins.xml in JAR
* Fixed missing or mismatching Trusted Checksum for some artifacts is not
properly reported
* Fixed regression causing Property not resolved in profile pluginManagement
sbt, xmvn:
* Minor code improvements
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3245=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3245=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3245=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3245=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3245=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3245=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3245=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3245=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3245=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3245=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3245=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3245=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3245=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3245=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3245=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3245=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* openSUSE Leap 15.6 (noarch)
* xmvn-tools-javadoc-4.2.0-150200.3.27.1
* sbt-0.13.18-150200.4.27.4
* maven-resolver-api-1.9.22-150200.3.26.1
* sbt-bootstrap-0.13.18-150200.4.27.4
* maven-resolver-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* xmvn-subst-4.2.0-150200.3.27.1
* xmvn-install-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* xmvn-core-4.2.0-150200.3.27.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* maven-resolver-javadoc-1.9.22-150200.3.26.1
* xmvn-mojo-javadoc-4.2.0-150200.3.27.1
* maven-javadoc-3.9.9-150200.4.30.1
* xmvn-connector-javadoc-4.2.0-150200.3.27.1
* maven-resolver-transport-classpath-1.9.22-150200.3.26.1
* xmvn-parent-4.2.0-150200.3.27.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-test-util-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* Development Tools Module 15-SP5 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* Development Tools Module 15-SP6 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Package Hub 15 15-SP5 (noarch)
* sbt-bootstrap-0.13.18-150200.4.27.4
* sbt-0.13.18-150200.4.27.4
* SUSE Package Hub 15 15-SP6 (noarch)
* sbt-bootstrap-0.13.18-150200.4.27.4
* sbt-0.13.18-150200.4.27.4
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Enterprise Storage 7.1 (noarch)
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* xmvn-install-4.2.0-150200.3.27.1
* xmvn-subst-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* maven-resolver-api-1.9.22-150200.3.26.1
* xmvn-core-4.2.0-150200.3.27.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* xmvn-4.2.0-150200.3.27.1
* xmvn-minimal-4.2.0-150200.3.27.1
* maven-3.9.9-150200.4.30.1
* maven-lib-3.9.9-150200.4.30.1
* openSUSE Leap 15.5 (noarch)
* xmvn-tools-javadoc-4.2.0-150200.3.27.1
* sbt-0.13.18-150200.4.27.4
* maven-resolver-api-1.9.22-150200.3.26.1
* sbt-bootstrap-0.13.18-150200.4.27.4
* maven-resolver-1.9.22-150200.3.26.1
* xmvn-api-4.2.0-150200.3.27.1
* maven-resolver-named-locks-1.9.22-150200.3.26.1
* xmvn-subst-4.2.0-150200.3.27.1
* xmvn-install-4.2.0-150200.3.27.1
* maven-resolver-impl-1.9.22-150200.3.26.1
* maven-resolver-transport-wagon-1.9.22-150200.3.26.1
* xmvn-connector-4.2.0-150200.3.27.1
* xmvn-core-4.2.0-150200.3.27.1
* maven-resolver-transport-file-1.9.22-150200.3.26.1
* maven-resolver-javadoc-1.9.22-150200.3.26.1
* xmvn-mojo-javadoc-4.2.0-150200.3.27.1
* maven-javadoc-3.9.9-150200.4.30.1
* xmvn-connector-javadoc-4.2.0-150200.3.27.1
* maven-resolver-transport-classpath-1.9.22-150200.3.26.1
* xmvn-parent-4.2.0-150200.3.27.1
* maven-resolver-util-1.9.22-150200.3.26.1
* maven-resolver-test-util-1.9.22-150200.3.26.1
* xmvn-resolve-4.2.0-150200.3.27.1
* maven-resolver-transport-http-1.9.22-150200.3.26.1
* xmvn-mojo-4.2.0-150200.3.27.1
* maven-resolver-spi-1.9.22-150200.3.26.1
* maven-resolver-connector-basic-1.9.22-150200.3.26.1
1
0
SUSE-RU-2024:3246-1: moderate: Recommended update for beust-jcommander
by OPENSUSE-UPDATES 16 Sep '24
by OPENSUSE-UPDATES 16 Sep '24
16 Sep '24
# Recommended update for beust-jcommander
Announcement ID: SUSE-RU-2024:3246-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for beust-jcommander fixes the following issues:
* beust-jcommander was upgraded to version 1.83:
* Fixed Docs Timestamp
* Fixed JCommander does not recognize command by alias
* Fixed missing null check
* Renamed IRule to IParametersValidator
* Added the new interface IRule, and the new rules attribute to @Paramters
* Fixed @-syntax not working with command objects
* Fixed regression with removed usage methods
* Add OSGi entries in MANIFEST.MF during jar creation
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3246=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3246=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3246=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3246=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3246=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3246=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3246=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3246=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3246=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3246=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3246=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3246=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3246=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3246=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3246=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3246=1
## Package List:
* SUSE Enterprise Storage 7.1 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* openSUSE Leap 15.5 (noarch)
* beust-jcommander-javadoc-1.83-150200.3.13.1
* beust-jcommander-1.83-150200.3.13.1
* openSUSE Leap 15.6 (noarch)
* beust-jcommander-javadoc-1.83-150200.3.13.1
* beust-jcommander-1.83-150200.3.13.1
* Development Tools Module 15-SP5 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* Development Tools Module 15-SP6 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* beust-jcommander-1.83-150200.3.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* beust-jcommander-1.83-150200.3.13.1
1
0
16 Sep '24
# Recommended update for hamcrest
Announcement ID: SUSE-RU-2024:3247-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for hamcrest fixes the following issues:
* hamcrest was updated to version 3.0:
* Breaking Changes:
* From version 3.0, the jar distributed to Maven Central is now compiled to Java 1.8 bytecode, and is not compatible with previous versions of Java. Developers who use Java 1.7 earlier can still depend upon hamcrest-2.2.jar.
* Improvements:
* FileMatchersTest simplification
* License cleanup
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3247=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3247=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3247=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3247=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3247=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3247=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3247=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3247=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3247=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3247=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3247=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3247=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3247=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3247=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3247=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3247=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3247=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* hamcrest-javadoc-3.0-150200.12.20.1
* hamcrest-3.0-150200.12.20.1
* openSUSE Leap 15.6 (noarch)
* hamcrest-javadoc-3.0-150200.12.20.1
* hamcrest-3.0-150200.12.20.1
* Development Tools Module 15-SP5 (noarch)
* hamcrest-3.0-150200.12.20.1
* Development Tools Module 15-SP6 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Package Hub 15 15-SP6 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* hamcrest-3.0-150200.12.20.1
* SUSE Enterprise Storage 7.1 (noarch)
* hamcrest-3.0-150200.12.20.1
1
0
13 Sep '24
# Recommended update for strace
Announcement ID: SUSE-RU-2024:3242-1
Rating: moderate
References:
* bsc#1228216
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for strace fixes the following issue:
* Change the license to the correct LGPL-2.1-or-later (bsc#1228216).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3242=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3242=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3242=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3242=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3242=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3242=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3242=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3242=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3242=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3242=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3242=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3242=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3242=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3242=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3242=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3242=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* strace-debuginfo-5.14-150400.3.3.2
* strace-5.14-150400.3.3.2
* strace-debugsource-5.14-150400.3.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228216
1
0
SUSE-RU-2024:3244-1: moderate: Recommended update for scap-security-guide
by OPENSUSE-UPDATES 13 Sep '24
by OPENSUSE-UPDATES 13 Sep '24
13 Sep '24
# Recommended update for scap-security-guide
Announcement ID: SUSE-RU-2024:3244-1
Rating: moderate
References:
* jsc#ECO-3319
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE Micro 5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains one feature can now be installed.
## Description:
This update for scap-security-guide fixes the following issues:
* Version update (jsc#ECO-3319).
* Add Amazon Linux 2023 product
* Introduce new remediation type Kickstart
* Make PAM macros more flexible to variables
* Remove Debian 10 Product
* Remove Red Hat Enterprise Linux 7 product
* Update CIS RHEL9 control file to v2.0.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3244=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3244=1
* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-3244=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3244=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3244=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3244=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3244=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3244=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3244=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3244=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3244=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3244=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3244=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3244=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3244=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3244=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3244=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3244=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3244=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3244=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3244=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3244=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3244=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3244=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3244=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3244=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3244=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3244=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* openSUSE Leap 15.6 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro 5.3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro 5.4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* Basesystem Module 15-SP5 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* Basesystem Module 15-SP6 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Manager Proxy 4.3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Manager Server 4.3 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Enterprise Storage 7.1 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro 5.1 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro 5.2 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* scap-security-guide-debian-0.1.74-150000.1.86.2
* scap-security-guide-ubuntu-0.1.74-150000.1.86.2
* scap-security-guide-redhat-0.1.74-150000.1.86.2
* scap-security-guide-0.1.74-150000.1.86.2
## References:
* https://jira.suse.com/browse/ECO-3319
1
0
13 Sep '24
# Recommended update for util-linux
Announcement ID: SUSE-RU-2024:3237-1
Rating: moderate
References:
* bsc#1229476
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for util-linux fixes the following issue:
* Skip aarch64 decode path for rest of the architectures (bsc#1229476).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3237=1 openSUSE-SLE-15.5-2024-3237=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3237=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3237=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3237=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3237=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3237=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libfdisk1-2.37.4-150500.9.17.2
* libuuid1-debuginfo-2.37.4-150500.9.17.2
* python3-libmount-debugsource-2.37.4-150500.9.17.2
* util-linux-2.37.4-150500.9.17.2
* python3-libmount-debuginfo-2.37.4-150500.9.17.2
* libblkid-devel-2.37.4-150500.9.17.2
* libsmartcols1-2.37.4-150500.9.17.2
* libmount1-2.37.4-150500.9.17.2
* util-linux-systemd-debugsource-2.37.4-150500.9.17.2
* libuuid-devel-2.37.4-150500.9.17.2
* libblkid1-2.37.4-150500.9.17.2
* uuidd-2.37.4-150500.9.17.2
* util-linux-systemd-2.37.4-150500.9.17.2
* util-linux-debugsource-2.37.4-150500.9.17.2
* libuuid-devel-static-2.37.4-150500.9.17.2
* libblkid-devel-static-2.37.4-150500.9.17.2
* libsmartcols1-debuginfo-2.37.4-150500.9.17.2
* libfdisk-devel-2.37.4-150500.9.17.2
* util-linux-debuginfo-2.37.4-150500.9.17.2
* libmount-devel-2.37.4-150500.9.17.2
* uuidd-debuginfo-2.37.4-150500.9.17.2
* libfdisk-devel-static-2.37.4-150500.9.17.2
* libuuid1-2.37.4-150500.9.17.2
* python3-libmount-2.37.4-150500.9.17.2
* libmount1-debuginfo-2.37.4-150500.9.17.2
* libblkid1-debuginfo-2.37.4-150500.9.17.2
* libsmartcols-devel-2.37.4-150500.9.17.2
* libmount-devel-static-2.37.4-150500.9.17.2
* libsmartcols-devel-static-2.37.4-150500.9.17.2
* libfdisk1-debuginfo-2.37.4-150500.9.17.2
* util-linux-systemd-debuginfo-2.37.4-150500.9.17.2
* openSUSE Leap 15.5 (x86_64)
* libblkid1-32bit-2.37.4-150500.9.17.2
* libfdisk1-32bit-debuginfo-2.37.4-150500.9.17.2
* libsmartcols1-32bit-2.37.4-150500.9.17.2
* libmount1-32bit-2.37.4-150500.9.17.2
* libuuid-devel-32bit-2.37.4-150500.9.17.2
* libsmartcols1-32bit-debuginfo-2.37.4-150500.9.17.2
* libblkid1-32bit-debuginfo-2.37.4-150500.9.17.2
* libmount-devel-32bit-2.37.4-150500.9.17.2
* libmount1-32bit-debuginfo-2.37.4-150500.9.17.2
* libblkid-devel-32bit-2.37.4-150500.9.17.2
* libfdisk-devel-32bit-2.37.4-150500.9.17.2
* libuuid1-32bit-debuginfo-2.37.4-150500.9.17.2
* libuuid1-32bit-2.37.4-150500.9.17.2
* libfdisk1-32bit-2.37.4-150500.9.17.2
* libsmartcols-devel-32bit-2.37.4-150500.9.17.2
* openSUSE Leap 15.5 (noarch)
* util-linux-lang-2.37.4-150500.9.17.2
* openSUSE Leap 15.5 (s390x)
* util-linux-extra-debuginfo-2.37.4-150500.9.17.2
* util-linux-extra-2.37.4-150500.9.17.2
* openSUSE Leap 15.5 (aarch64_ilp32)
* libuuid1-64bit-debuginfo-2.37.4-150500.9.17.2
* libmount1-64bit-debuginfo-2.37.4-150500.9.17.2
* libblkid1-64bit-2.37.4-150500.9.17.2
* libfdisk1-64bit-debuginfo-2.37.4-150500.9.17.2
* libfdisk1-64bit-2.37.4-150500.9.17.2
* libmount1-64bit-2.37.4-150500.9.17.2
* libblkid-devel-64bit-2.37.4-150500.9.17.2
* libsmartcols-devel-64bit-2.37.4-150500.9.17.2
* libsmartcols1-64bit-2.37.4-150500.9.17.2
* libmount-devel-64bit-2.37.4-150500.9.17.2
* libuuid-devel-64bit-2.37.4-150500.9.17.2
* libblkid1-64bit-debuginfo-2.37.4-150500.9.17.2
* libsmartcols1-64bit-debuginfo-2.37.4-150500.9.17.2
* libuuid1-64bit-2.37.4-150500.9.17.2
* libfdisk-devel-64bit-2.37.4-150500.9.17.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libblkid1-debuginfo-2.37.4-150500.9.17.2
* libfdisk1-2.37.4-150500.9.17.2
* libblkid1-2.37.4-150500.9.17.2
* libuuid1-debuginfo-2.37.4-150500.9.17.2
* util-linux-2.37.4-150500.9.17.2
* util-linux-systemd-2.37.4-150500.9.17.2
* libsmartcols1-debuginfo-2.37.4-150500.9.17.2
* libsmartcols1-2.37.4-150500.9.17.2
* util-linux-debuginfo-2.37.4-150500.9.17.2
* util-linux-debugsource-2.37.4-150500.9.17.2
* libmount1-2.37.4-150500.9.17.2
* util-linux-systemd-debugsource-2.37.4-150500.9.17.2
* libfdisk1-debuginfo-2.37.4-150500.9.17.2
* libuuid1-2.37.4-150500.9.17.2
* util-linux-systemd-debuginfo-2.37.4-150500.9.17.2
* libmount1-debuginfo-2.37.4-150500.9.17.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-libmount-debugsource-2.37.4-150500.9.17.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libblkid1-debuginfo-2.37.4-150500.9.17.2
* libfdisk1-2.37.4-150500.9.17.2
* libblkid1-2.37.4-150500.9.17.2
* libuuid1-debuginfo-2.37.4-150500.9.17.2
* util-linux-2.37.4-150500.9.17.2
* util-linux-systemd-2.37.4-150500.9.17.2
* libsmartcols1-debuginfo-2.37.4-150500.9.17.2
* libsmartcols1-2.37.4-150500.9.17.2
* util-linux-debuginfo-2.37.4-150500.9.17.2
* util-linux-debugsource-2.37.4-150500.9.17.2
* libmount1-2.37.4-150500.9.17.2
* util-linux-systemd-debugsource-2.37.4-150500.9.17.2
* libfdisk1-debuginfo-2.37.4-150500.9.17.2
* libuuid1-2.37.4-150500.9.17.2
* util-linux-systemd-debuginfo-2.37.4-150500.9.17.2
* libmount1-debuginfo-2.37.4-150500.9.17.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfdisk1-2.37.4-150500.9.17.2
* libuuid1-debuginfo-2.37.4-150500.9.17.2
* util-linux-2.37.4-150500.9.17.2
* libblkid-devel-2.37.4-150500.9.17.2
* libsmartcols1-2.37.4-150500.9.17.2
* libmount1-2.37.4-150500.9.17.2
* util-linux-systemd-debugsource-2.37.4-150500.9.17.2
* libuuid-devel-2.37.4-150500.9.17.2
* libblkid1-2.37.4-150500.9.17.2
* util-linux-systemd-2.37.4-150500.9.17.2
* util-linux-debugsource-2.37.4-150500.9.17.2
* libuuid-devel-static-2.37.4-150500.9.17.2
* libblkid-devel-static-2.37.4-150500.9.17.2
* libsmartcols1-debuginfo-2.37.4-150500.9.17.2
* libfdisk-devel-2.37.4-150500.9.17.2
* util-linux-debuginfo-2.37.4-150500.9.17.2
* libmount-devel-2.37.4-150500.9.17.2
* libuuid1-2.37.4-150500.9.17.2
* libmount1-debuginfo-2.37.4-150500.9.17.2
* libblkid1-debuginfo-2.37.4-150500.9.17.2
* libsmartcols-devel-2.37.4-150500.9.17.2
* libfdisk1-debuginfo-2.37.4-150500.9.17.2
* util-linux-systemd-debuginfo-2.37.4-150500.9.17.2
* Basesystem Module 15-SP5 (noarch)
* util-linux-lang-2.37.4-150500.9.17.2
* Basesystem Module 15-SP5 (x86_64)
* libblkid1-32bit-2.37.4-150500.9.17.2
* libmount1-32bit-2.37.4-150500.9.17.2
* libmount1-32bit-debuginfo-2.37.4-150500.9.17.2
* libblkid1-32bit-debuginfo-2.37.4-150500.9.17.2
* libuuid1-32bit-debuginfo-2.37.4-150500.9.17.2
* libuuid1-32bit-2.37.4-150500.9.17.2
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* uuidd-2.37.4-150500.9.17.2
* util-linux-systemd-debugsource-2.37.4-150500.9.17.2
* uuidd-debuginfo-2.37.4-150500.9.17.2
* util-linux-systemd-debuginfo-2.37.4-150500.9.17.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229476
1
0