openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2024
- 3 participants
- 344 discussions
11 Sep '24
# Security update for python311
Announcement ID: SUSE-SU-2024:3200-1
Rating: important
References:
* bsc#1225660
* bsc#1227378
* bsc#1227999
* bsc#1228780
Cross-References:
* CVE-2024-6923
CVSS scores:
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has three security fixes can now be
installed.
## Description:
This update for python311 fixes the following issues:
* CVE-2024-6923: Fixed email header injection due to unquoted newlines
(bsc#1228780)
Other fixes: \- %{profileopt} variable is set according to the variable
%{do_profiling} (bsc#1227999) \- Stop using %%defattr, it seems to be breaking
proper executable attributes on /usr/bin/ scripts (bsc#1227378) \- Make pip and
modern tools install directly in /usr/local when used by the user (bsc#1225660)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3200=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3200=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3200=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3200=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3200=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3200=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3200=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3200=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3200=1
## Package List:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-tk-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-testsuite-debuginfo-3.11.9-150400.9.32.3
* python311-testsuite-3.11.9-150400.9.32.3
* python311-doc-3.11.9-150400.9.32.1
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-3.11.9-150400.9.32.4
* python311-devel-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-debugsource-3.11.9-150400.9.32.4
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-dbm-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.4 (x86_64)
* python311-base-32bit-debuginfo-3.11.9-150400.9.32.3
* python311-32bit-3.11.9-150400.9.32.4
* python311-base-32bit-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-debuginfo-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-3.11.9-150400.9.32.3
* python311-32bit-debuginfo-3.11.9-150400.9.32.4
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpython3_11-1_0-64bit-3.11.9-150400.9.32.3
* python311-64bit-debuginfo-3.11.9-150400.9.32.4
* libpython3_11-1_0-64bit-debuginfo-3.11.9-150400.9.32.3
* python311-base-64bit-3.11.9-150400.9.32.3
* python311-64bit-3.11.9-150400.9.32.4
* python311-base-64bit-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-testsuite-debuginfo-3.11.9-150400.9.32.3
* python311-testsuite-3.11.9-150400.9.32.3
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-devel-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-debugsource-3.11.9-150400.9.32.4
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-dbm-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.5 (x86_64)
* python311-base-32bit-debuginfo-3.11.9-150400.9.32.3
* python311-32bit-3.11.9-150400.9.32.4
* python311-base-32bit-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-debuginfo-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-3.11.9-150400.9.32.3
* python311-32bit-debuginfo-3.11.9-150400.9.32.4
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
## References:
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225660
* https://bugzilla.suse.com/show_bug.cgi?id=1227378
* https://bugzilla.suse.com/show_bug.cgi?id=1227999
* https://bugzilla.suse.com/show_bug.cgi?id=1228780
1
0
SUSE-RU-2024:3201-1: moderate: Recommended update for yast2-installation
by OPENSUSE-UPDATES 11 Sep '24
by OPENSUSE-UPDATES 11 Sep '24
11 Sep '24
# Recommended update for yast2-installation
Announcement ID: SUSE-RU-2024:3201-1
Rating: moderate
References:
* bsc#1181625
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for yast2-installation fixes the following issue:
* Don't block in AutoYaST upgrade (bsc#1181625).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3201=1 openSUSE-SLE-15.5-2024-3201=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3201=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* yast2-installation-4.5.20-150500.3.12.3
* Basesystem Module 15-SP5 (noarch)
* yast2-installation-4.5.20-150500.3.12.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1181625
1
0
openSUSE-RU-2024:0297-1: moderate: Recommended update for lsyncd
by maintenance@opensuse.org 10 Sep '24
by maintenance@opensuse.org 10 Sep '24
10 Sep '24
openSUSE Recommended Update: Recommended update for lsyncd
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0297-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for lsyncd fixes the following issues:
update to version 2.3.1 (2022-11-17):
* multiple bugfixes, style fixes
* add nix flake support
* add support for tunnel commands
* add support for batchSizeLimit
* add -onepass option
* add crontab support
* support relative executable paths
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-297=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-297=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
lsyncd-2.3.1-bp156.4.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
lsyncd-2.3.1-bp155.3.3.1
lsyncd-debuginfo-2.3.1-bp155.3.3.1
lsyncd-debugsource-2.3.1-bp155.3.3.1
References:
1
0
10 Sep '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:3187-1
Rating: important
References:
* bsc#1229823
Cross-References:
* CVE-2024-45230
CVSS scores:
* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Django fixes the following issues:
There is an issue with the previous fix for CVE-2024-45230. Please consider the
following vulnerability fixed only after the installation of this update. \-
CVE-2024-45230: Fixed potential denial-of-service vulnerability in
django.utils.html.urlize(). (bsc#1229823)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3187=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python3-Django-2.0.7-150000.1.36.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229823
1
0
10 Sep '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3190-1
Rating: important
References:
* bsc#1193629
* bsc#1194111
* bsc#1194765
* bsc#1194869
* bsc#1196261
* bsc#1196516
* bsc#1196894
* bsc#1198017
* bsc#1203329
* bsc#1203330
* bsc#1203360
* bsc#1205462
* bsc#1206006
* bsc#1206258
* bsc#1206843
* bsc#1207158
* bsc#1208783
* bsc#1210644
* bsc#1213580
* bsc#1213632
* bsc#1214285
* bsc#1216834
* bsc#1220428
* bsc#1220877
* bsc#1220962
* bsc#1221269
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1222335
* bsc#1222350
* bsc#1222372
* bsc#1222387
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1223074
* bsc#1223191
* bsc#1223508
* bsc#1223720
* bsc#1223742
* bsc#1223777
* bsc#1223803
* bsc#1223807
* bsc#1224105
* bsc#1224415
* bsc#1224496
* bsc#1224510
* bsc#1224542
* bsc#1224578
* bsc#1224639
* bsc#1225162
* bsc#1225352
* bsc#1225428
* bsc#1225524
* bsc#1225578
* bsc#1225582
* bsc#1225773
* bsc#1225814
* bsc#1225827
* bsc#1225832
* bsc#1225903
* bsc#1226168
* bsc#1226530
* bsc#1226613
* bsc#1226742
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226874
* bsc#1226885
* bsc#1227079
* bsc#1227623
* bsc#1227761
* bsc#1227830
* bsc#1227863
* bsc#1227867
* bsc#1227929
* bsc#1227937
* bsc#1227958
* bsc#1228020
* bsc#1228065
* bsc#1228114
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228469
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228501
* bsc#1228503
* bsc#1228509
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228526
* bsc#1228531
* bsc#1228563
* bsc#1228564
* bsc#1228567
* bsc#1228576
* bsc#1228579
* bsc#1228584
* bsc#1228588
* bsc#1228590
* bsc#1228615
* bsc#1228616
* bsc#1228635
* bsc#1228636
* bsc#1228654
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228667
* bsc#1228673
* bsc#1228677
* bsc#1228687
* bsc#1228706
* bsc#1228708
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228748
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228979
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229042
* bsc#1229054
* bsc#1229086
* bsc#1229136
* bsc#1229154
* bsc#1229187
* bsc#1229188
* bsc#1229190
* bsc#1229287
* bsc#1229290
* bsc#1229292
* bsc#1229296
* bsc#1229297
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229314
* bsc#1229315
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229327
* bsc#1229341
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229354
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229366
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229418
* bsc#1229444
* bsc#1229453
* bsc#1229454
* bsc#1229481
* bsc#1229482
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229506
* bsc#1229507
* bsc#1229508
* bsc#1229509
* bsc#1229510
* bsc#1229512
* bsc#1229516
* bsc#1229521
* bsc#1229522
* bsc#1229523
* bsc#1229524
* bsc#1229525
* bsc#1229526
* bsc#1229527
* bsc#1229528
* bsc#1229529
* bsc#1229531
* bsc#1229533
* bsc#1229535
* bsc#1229536
* bsc#1229537
* bsc#1229540
* bsc#1229544
* bsc#1229545
* bsc#1229546
* bsc#1229547
* bsc#1229548
* bsc#1229554
* bsc#1229557
* bsc#1229558
* bsc#1229559
* bsc#1229560
* bsc#1229562
* bsc#1229564
* bsc#1229565
* bsc#1229566
* bsc#1229568
* bsc#1229569
* bsc#1229572
* bsc#1229573
* bsc#1229576
* bsc#1229581
* bsc#1229588
* bsc#1229598
* bsc#1229603
* bsc#1229604
* bsc#1229605
* bsc#1229608
* bsc#1229611
* bsc#1229612
* bsc#1229613
* bsc#1229614
* bsc#1229615
* bsc#1229616
* bsc#1229617
* bsc#1229620
* bsc#1229622
* bsc#1229623
* bsc#1229624
* bsc#1229625
* bsc#1229626
* bsc#1229628
* bsc#1229629
* bsc#1229630
* bsc#1229631
* bsc#1229632
* bsc#1229635
* bsc#1229636
* bsc#1229637
* bsc#1229638
* bsc#1229639
* bsc#1229641
* bsc#1229642
* bsc#1229643
* bsc#1229645
* bsc#1229657
* bsc#1229658
* bsc#1229662
* bsc#1229664
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229768
* bsc#1229781
* bsc#1229784
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* jsc#PED-8491
* jsc#PED-8779
Cross-References:
* CVE-2021-4441
* CVE-2021-47106
* CVE-2021-47517
* CVE-2021-47546
* CVE-2022-38457
* CVE-2022-40133
* CVE-2022-48645
* CVE-2022-48706
* CVE-2022-48808
* CVE-2022-48865
* CVE-2022-48868
* CVE-2022-48869
* CVE-2022-48870
* CVE-2022-48871
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48875
* CVE-2022-48878
* CVE-2022-48880
* CVE-2022-48881
* CVE-2022-48882
* CVE-2022-48883
* CVE-2022-48884
* CVE-2022-48885
* CVE-2022-48886
* CVE-2022-48887
* CVE-2022-48888
* CVE-2022-48889
* CVE-2022-48890
* CVE-2022-48891
* CVE-2022-48893
* CVE-2022-48896
* CVE-2022-48898
* CVE-2022-48899
* CVE-2022-48903
* CVE-2022-48904
* CVE-2022-48905
* CVE-2022-48906
* CVE-2022-48907
* CVE-2022-48909
* CVE-2022-48910
* CVE-2022-48912
* CVE-2022-48913
* CVE-2022-48914
* CVE-2022-48915
* CVE-2022-48916
* CVE-2022-48917
* CVE-2022-48918
* CVE-2022-48919
* CVE-2022-48920
* CVE-2022-48921
* CVE-2022-48923
* CVE-2022-48924
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48927
* CVE-2022-48928
* CVE-2022-48929
* CVE-2022-48930
* CVE-2022-48931
* CVE-2022-48932
* CVE-2022-48934
* CVE-2022-48937
* CVE-2022-48938
* CVE-2022-48939
* CVE-2022-48940
* CVE-2022-48941
* CVE-2022-48942
* CVE-2022-48943
* CVE-2023-3610
* CVE-2023-52458
* CVE-2023-52489
* CVE-2023-52498
* CVE-2023-52581
* CVE-2023-52859
* CVE-2023-52887
* CVE-2023-52889
* CVE-2023-52893
* CVE-2023-52894
* CVE-2023-52896
* CVE-2023-52898
* CVE-2023-52899
* CVE-2023-52900
* CVE-2023-52901
* CVE-2023-52904
* CVE-2023-52905
* CVE-2023-52906
* CVE-2023-52907
* CVE-2023-52908
* CVE-2023-52909
* CVE-2023-52910
* CVE-2023-52911
* CVE-2023-52912
* CVE-2023-52913
* CVE-2024-26631
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26851
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27016
* CVE-2024-27024
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-31076
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35945
* CVE-2024-35971
* CVE-2024-36009
* CVE-2024-36013
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36489
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36936
* CVE-2024-36962
* CVE-2024-38554
* CVE-2024-38602
* CVE-2024-38662
* CVE-2024-39489
* CVE-2024-40905
* CVE-2024-40978
* CVE-2024-40980
* CVE-2024-40995
* CVE-2024-41000
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41042
* CVE-2024-41045
* CVE-2024-41056
* CVE-2024-41060
* CVE-2024-41062
* CVE-2024-41065
* CVE-2024-41068
* CVE-2024-41073
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41095
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42069
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42095
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42110
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42137
* CVE-2024-42139
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42225
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42244
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42268
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42315
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43849
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43904
* CVE-2024-43905
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-44938
* CVE-2024-44939
* CVE-2024-44947
CVSS scores:
* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48878 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48882 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48883 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48884 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48885 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48938 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52912 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 292 vulnerabilities, contains two features and has 45
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
* CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
* CVE-2024-43893: Check uartclk for zero to avoid divide by zero
(bsc#1229759).
* CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
* CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
* CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
* CVE-2024-44939: fix null ptr deref in dtInsertEntry (bsc#1229820).
* CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
* CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
* CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
* CVE-2024-43904: Add null checks for 'stream' and 'plane' before
dereferencing (bsc#1229768)
* CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
* CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
* CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
* CVE-2022-48920: Get rid of warning on transaction commit when using
flushoncommit (bsc#1229658).
* CVE-2023-52906: Fix warning during failed attribute validation
(bsc#1229527).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
* CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
* CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is
large (bsc#1229605)
* CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
* CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2023-52899: Add exception protection processing for vd in
axi_chan_handle_err function (bsc#1229569).
* CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
* CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
* CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
* CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy()
(bsc#1220962)
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225428).
* CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
* CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-35897: Discard table flag update with pending basechain deletion
(bsc#1224510).
* CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
* CVE-2024-43819: Reject memory region operations for ucontrol VMs
(bsc#1229290 git-fixes).
* CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).
* CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
* CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).
* CVE-2024-27016: Validate pppoe header (bsc#1223807).
* CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
* CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).
* CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
* CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
* CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
* CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)
* CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
* CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157
git-fixes).
* CVE-2024-26677: Blacklist e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set
the reference serial number") (bsc#1222387)
* CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue")
(bsc#1224542)
* CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
* CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
* CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
(bsc#1229382)
* CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
* CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-43854: Initialize integrity buffer to zero before writing it to
media (bsc#1229345)
* CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
* CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2024-26669: Fix chain template offload (bsc#1222350).
* CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287,).
* CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features()
(bsc#1223508).
* CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
(bsc#1229370).
* CVE-2024-42319: Move devm_mbox_controller_register() after
devm_pm_runtime_enable() (bsc#1229350).
* CVE-2024-43860: Skip over memory region when node value is NULL
(bsc#1229319).
* CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
* CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
* CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
* CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures
(bsc#1229301).
* CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
* CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
(bsc#1228616).
* CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).
* CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).
* CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
* CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
* CVE-2023-52498: Fix possible deadlocks in core system-wide PM code
(bsc#1221269).
* CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown
(bsc#1227958).
* CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
* CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
* CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42139: Fix improper extts handling (bsc#1228503).
* CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
* CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
* CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
* CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
exploited to achieve local privilege escalation (bsc#1213580).
* CVE-2024-42228: Using uninitialized value *size when calling
amdgpu_vce_cs_reloc (bsc#1228667).
* CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).
* CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes
CVE-2024-38602 bsc#1226613).
* CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
* CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).
The following non-security bugs were fixed:
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPI: bus: Rework system-level device notification handling (git-fixes).
* ACPI: thermal: Drop nocrt parameter (git-fixes).
* ACPI: x86: s2idle: Post-increment variables when getting constraints (git-
fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cpufeature: Add missing .field_width for GIC system registers (git-
fixes)
* arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
* arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-
fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: errata: Add workaround for Arm errata 3194386 and 3312417 (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update
default configuration.
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* async: Introduce async_schedule_dev_nocall() (bsc#1221269).
* async: Split async_schedule_node_domain() (bsc#1221269).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
* btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
* btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229418).
* ceph: issue a cap release immediately if no cap exists (bsc#1225162).
* ceph: periodically flush the cap releases (bsc#1225162).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
* drm: panel-orientation-quirks: Add labels for both Valve Steam Deck
revisions (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-
fixes).
* drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values
can be stored (stable-fixes).
* drm/amd/display: Add NULL check for 'afb' before dereferencing in
amdgpu_dm_plane_handle_cursor_update (stable-fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: Fix && vs || typos (git-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/display: Validate hw_points_num before using it (stable-fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/tegra: Zero-initialize iosys_map (stable-fixes).
* exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes).
* exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
* exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
* exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229453).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* genirq: Add might_sleep() to disable_irq() (git-fixes).
* genirq: Always limit the affinity to online CPUs (git-fixes).
* genirq: Do not return error on missing optional irq_request_resources()
(git-fixes).
* genirq: Take the proposed affinity at face value if force==true (git-fixes).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-
fixes).
* genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-
fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
* irqdomain: Fix association race (git-fixes).
* irqdomain: Fix disassociation race (git-fixes).
* irqdomain: Fix domain registration race (git-fixes).
* irqdomain: Fix mapping-creation race (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* irqdomain: Look for existing mapping only once (git-fixes).
* irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
* irqdomain: Report irq number for NOMAP domains (git-fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* lockd: move from strlcpy with unused retval to strscpy (git-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-
fixes).
* net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
* net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
* net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: remove two BUG() from skb_checksum_help() (bsc#1229312).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
* NFSD: add security label to struct nfsd_attrs (git-fixes).
* NFSD: fix regression with setting ACLs (git-fixes).
* NFSD: Fix strncpy() fortify warning (git-fixes).
* NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
* NFSD: introduce struct nfsd_attrs (git-fixes).
* NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
* NFSD: Optimize DRC bucket pruning (git-fixes).
* nfsd: return error if nfs4_setacl fails (git-fixes).
* NFSD: set attributes when creating symlinks (git-fixes).
* nfsd: use locks_inode_context helper (git-fixes).
* nilfs2: Remove check for PageError (git-fixes).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* ocfs2: use coarse time for new created files (git-fixes).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
* powerpc: Mark .opd section read-only (bsc#1194869).
* powerpc: use generic version of arch_is_kernel_initmem_freed()
(bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
* RDMA/rxe: Fix rxe_modify_srq (git-fixes)
* RDMA/rxe: Move work queue code to subroutines (git-fixes)
* s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
* s390/cpacf: Make use of invalid opcode produce a link error (git-fixes
bsc#1227079).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229190).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229573).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229188).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* RDMA/rxe: Handle zero length rdma (git-fixes)
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
* x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-
fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3190=1 openSUSE-SLE-15.5-2024-3190=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3190=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* dlm-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-extra-5.14.21-150500.33.66.1
* kernel-azure-optional-5.14.21-150500.33.66.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-devel-5.14.21-150500.33.66.1
* reiserfs-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.66.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-debuginfo-5.14.21-150500.33.66.1
* kselftests-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.66.1
* cluster-md-kmp-azure-5.14.21-150500.33.66.1
* kernel-syms-azure-5.14.21-150500.33.66.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* ocfs2-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-debugsource-5.14.21-150500.33.66.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.66.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* gfs2-kmp-azure-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-5.14.21-150500.33.66.1
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.66.1
* kernel-devel-azure-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-debuginfo-5.14.21-150500.33.66.1
* kernel-syms-azure-5.14.21-150500.33.66.1
* kernel-azure-debugsource-5.14.21-150500.33.66.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-devel-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.66.1
* kernel-devel-azure-5.14.21-150500.33.66.1
## References:
* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2021-47106.html
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2022-38457.html
* https://www.suse.com/security/cve/CVE-2022-40133.html
* https://www.suse.com/security/cve/CVE-2022-48645.html
* https://www.suse.com/security/cve/CVE-2022-48706.html
* https://www.suse.com/security/cve/CVE-2022-48808.html
* https://www.suse.com/security/cve/CVE-2022-48865.html
* https://www.suse.com/security/cve/CVE-2022-48868.html
* https://www.suse.com/security/cve/CVE-2022-48869.html
* https://www.suse.com/security/cve/CVE-2022-48870.html
* https://www.suse.com/security/cve/CVE-2022-48871.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48875.html
* https://www.suse.com/security/cve/CVE-2022-48878.html
* https://www.suse.com/security/cve/CVE-2022-48880.html
* https://www.suse.com/security/cve/CVE-2022-48881.html
* https://www.suse.com/security/cve/CVE-2022-48882.html
* https://www.suse.com/security/cve/CVE-2022-48883.html
* https://www.suse.com/security/cve/CVE-2022-48884.html
* https://www.suse.com/security/cve/CVE-2022-48885.html
* https://www.suse.com/security/cve/CVE-2022-48886.html
* https://www.suse.com/security/cve/CVE-2022-48887.html
* https://www.suse.com/security/cve/CVE-2022-48888.html
* https://www.suse.com/security/cve/CVE-2022-48889.html
* https://www.suse.com/security/cve/CVE-2022-48890.html
* https://www.suse.com/security/cve/CVE-2022-48891.html
* https://www.suse.com/security/cve/CVE-2022-48893.html
* https://www.suse.com/security/cve/CVE-2022-48896.html
* https://www.suse.com/security/cve/CVE-2022-48898.html
* https://www.suse.com/security/cve/CVE-2022-48899.html
* https://www.suse.com/security/cve/CVE-2022-48903.html
* https://www.suse.com/security/cve/CVE-2022-48904.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48906.html
* https://www.suse.com/security/cve/CVE-2022-48907.html
* https://www.suse.com/security/cve/CVE-2022-48909.html
* https://www.suse.com/security/cve/CVE-2022-48910.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48913.html
* https://www.suse.com/security/cve/CVE-2022-48914.html
* https://www.suse.com/security/cve/CVE-2022-48915.html
* https://www.suse.com/security/cve/CVE-2022-48916.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48918.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48920.html
* https://www.suse.com/security/cve/CVE-2022-48921.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48924.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48927.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48929.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48931.html
* https://www.suse.com/security/cve/CVE-2022-48932.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2022-48937.html
* https://www.suse.com/security/cve/CVE-2022-48938.html
* https://www.suse.com/security/cve/CVE-2022-48939.html
* https://www.suse.com/security/cve/CVE-2022-48940.html
* https://www.suse.com/security/cve/CVE-2022-48941.html
* https://www.suse.com/security/cve/CVE-2022-48942.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2023-3610.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52498.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2023-52893.html
* https://www.suse.com/security/cve/CVE-2023-52894.html
* https://www.suse.com/security/cve/CVE-2023-52896.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52899.html
* https://www.suse.com/security/cve/CVE-2023-52900.html
* https://www.suse.com/security/cve/CVE-2023-52901.html
* https://www.suse.com/security/cve/CVE-2023-52904.html
* https://www.suse.com/security/cve/CVE-2023-52905.html
* https://www.suse.com/security/cve/CVE-2023-52906.html
* https://www.suse.com/security/cve/CVE-2023-52907.html
* https://www.suse.com/security/cve/CVE-2023-52908.html
* https://www.suse.com/security/cve/CVE-2023-52909.html
* https://www.suse.com/security/cve/CVE-2023-52910.html
* https://www.suse.com/security/cve/CVE-2023-52911.html
* https://www.suse.com/security/cve/CVE-2023-52912.html
* https://www.suse.com/security/cve/CVE-2023-52913.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27016.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36962.html
* https://www.suse.com/security/cve/CVE-2024-38554.html
* https://www.suse.com/security/cve/CVE-2024-38602.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40980.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194111
* https://bugzilla.suse.com/show_bug.cgi?id=1194765
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196261
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196894
* https://bugzilla.suse.com/show_bug.cgi?id=1198017
* https://bugzilla.suse.com/show_bug.cgi?id=1203329
* https://bugzilla.suse.com/show_bug.cgi?id=1203330
* https://bugzilla.suse.com/show_bug.cgi?id=1203360
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1206006
* https://bugzilla.suse.com/show_bug.cgi?id=1206258
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1207158
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1213580
* https://bugzilla.suse.com/show_bug.cgi?id=1213632
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220962
* https://bugzilla.suse.com/show_bug.cgi?id=1221269
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223508
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1223807
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1225162
* https://bugzilla.suse.com/show_bug.cgi?id=1225352
* https://bugzilla.suse.com/show_bug.cgi?id=1225428
* https://bugzilla.suse.com/show_bug.cgi?id=1225524
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225827
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226168
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226613
* https://bugzilla.suse.com/show_bug.cgi?id=1226742
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1227079
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227937
* https://bugzilla.suse.com/show_bug.cgi?id=1227958
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228065
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228526
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229187
* https://bugzilla.suse.com/show_bug.cgi?id=1229188
* https://bugzilla.suse.com/show_bug.cgi?id=1229190
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229418
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229453
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229506
* https://bugzilla.suse.com/show_bug.cgi?id=1229507
* https://bugzilla.suse.com/show_bug.cgi?id=1229508
* https://bugzilla.suse.com/show_bug.cgi?id=1229509
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229516
* https://bugzilla.suse.com/show_bug.cgi?id=1229521
* https://bugzilla.suse.com/show_bug.cgi?id=1229522
* https://bugzilla.suse.com/show_bug.cgi?id=1229523
* https://bugzilla.suse.com/show_bug.cgi?id=1229524
* https://bugzilla.suse.com/show_bug.cgi?id=1229525
* https://bugzilla.suse.com/show_bug.cgi?id=1229526
* https://bugzilla.suse.com/show_bug.cgi?id=1229527
* https://bugzilla.suse.com/show_bug.cgi?id=1229528
* https://bugzilla.suse.com/show_bug.cgi?id=1229529
* https://bugzilla.suse.com/show_bug.cgi?id=1229531
* https://bugzilla.suse.com/show_bug.cgi?id=1229533
* https://bugzilla.suse.com/show_bug.cgi?id=1229535
* https://bugzilla.suse.com/show_bug.cgi?id=1229536
* https://bugzilla.suse.com/show_bug.cgi?id=1229537
* https://bugzilla.suse.com/show_bug.cgi?id=1229540
* https://bugzilla.suse.com/show_bug.cgi?id=1229544
* https://bugzilla.suse.com/show_bug.cgi?id=1229545
* https://bugzilla.suse.com/show_bug.cgi?id=1229546
* https://bugzilla.suse.com/show_bug.cgi?id=1229547
* https://bugzilla.suse.com/show_bug.cgi?id=1229548
* https://bugzilla.suse.com/show_bug.cgi?id=1229554
* https://bugzilla.suse.com/show_bug.cgi?id=1229557
* https://bugzilla.suse.com/show_bug.cgi?id=1229558
* https://bugzilla.suse.com/show_bug.cgi?id=1229559
* https://bugzilla.suse.com/show_bug.cgi?id=1229560
* https://bugzilla.suse.com/show_bug.cgi?id=1229562
* https://bugzilla.suse.com/show_bug.cgi?id=1229564
* https://bugzilla.suse.com/show_bug.cgi?id=1229565
* https://bugzilla.suse.com/show_bug.cgi?id=1229566
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229569
* https://bugzilla.suse.com/show_bug.cgi?id=1229572
* https://bugzilla.suse.com/show_bug.cgi?id=1229573
* https://bugzilla.suse.com/show_bug.cgi?id=1229576
* https://bugzilla.suse.com/show_bug.cgi?id=1229581
* https://bugzilla.suse.com/show_bug.cgi?id=1229588
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229603
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229605
* https://bugzilla.suse.com/show_bug.cgi?id=1229608
* https://bugzilla.suse.com/show_bug.cgi?id=1229611
* https://bugzilla.suse.com/show_bug.cgi?id=1229612
* https://bugzilla.suse.com/show_bug.cgi?id=1229613
* https://bugzilla.suse.com/show_bug.cgi?id=1229614
* https://bugzilla.suse.com/show_bug.cgi?id=1229615
* https://bugzilla.suse.com/show_bug.cgi?id=1229616
* https://bugzilla.suse.com/show_bug.cgi?id=1229617
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229622
* https://bugzilla.suse.com/show_bug.cgi?id=1229623
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229625
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229628
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229631
* https://bugzilla.suse.com/show_bug.cgi?id=1229632
* https://bugzilla.suse.com/show_bug.cgi?id=1229635
* https://bugzilla.suse.com/show_bug.cgi?id=1229636
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229638
* https://bugzilla.suse.com/show_bug.cgi?id=1229639
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229642
* https://bugzilla.suse.com/show_bug.cgi?id=1229643
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229658
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229664
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
1
0
10 Sep '24
# Recommended update for cups
Announcement ID: SUSE-RU-2024:3185-1
Rating: moderate
References:
* bsc#1226227
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for cups fixes the following issues:
* Fixed cupsd failing to authenticate users when group membership is required
(bsc#1226227)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3185=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3185=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3185=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3185=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3185=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3185=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3185=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3185=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3185=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3185=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3185=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3185=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3185=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3185=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3185=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3185=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3185=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3185=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.5 (x86_64)
* libcupsimage2-32bit-2.2.7-150000.3.65.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-devel-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.6 (x86_64)
* libcupsimage2-32bit-2.2.7-150000.3.65.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-devel-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* Desktop Applications Module 15-SP5 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* Desktop Applications Module 15-SP6 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-debugsource-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-debugsource-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Proxy 4.3 (x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Server 4.3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1226227
1
0
10 Sep '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:3186-1
Rating: important
References:
* bsc#1221243
* bsc#1221677
* bsc#1224117
Cross-References:
* CVE-2024-1753
* CVE-2024-24786
* CVE-2024-28180
* CVE-2024-3727
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for buildah fixes the following issues:
Update to version 1.35.4:
* CVE-2024-3727 updates (bsc#1224117)
* Bump go-jose CVE-2024-28180
* Bump ocicrypt and go-jose CVE-2024-28180
Update to version 1.35.3:
* correctly configure /etc/hosts and resolv.conf
* buildah: refactor resolv/hosts setup.
* rename the hostFile var to reflect
* CVE-2024-24786 protobuf to 1.33
Update to version 1.35.1:
* CVE-2024-1753 container escape fix (bsc#1221677)
* Buildah dropped cni support, require netavark instead (bsc#1221243)
* Remove obsolete requires libcontainers-image & libcontainers-storage
* Require passt for rootless networking (poo#156955) Buildah moved to
passt/pasta for rootless networking from slirp4netns
(https://github.com/containers/common/pull/1846)
Update to version 1.35.0:
* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* Update module go.etcd.io/bbolt to v1.3.9
* Update module github.com/opencontainers/image-spec to v1.1.0
* build --all-platforms: skip some base "image" platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* imagebuildah: fix crash with empty RUN
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* Replace map[K]bool with map[K]struct{} where it makes sense
* Bump CI VMs
* Replace strings.SplitN with strings.Cut
* Document use of containers-transports values in buildah
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* [skip-ci] Update actions/stale action to v9
* Ignore errors if label.Relabel returns ENOSUP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3186=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3186=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3186=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3186=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3186=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* buildah-1.35.4-150400.3.30.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* buildah-1.35.4-150400.3.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-28180.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221243
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
* https://bugzilla.suse.com/show_bug.cgi?id=1224117
1
0
openSUSE-RU-2024:0295-1: moderate: Recommended update for python-django-webtest
by maintenance@opensuse.org 09 Sep '24
by maintenance@opensuse.org 09 Sep '24
09 Sep '24
openSUSE Recommended Update: Recommended update for python-django-webtest
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0295-1
Rating: moderate
References: #1229551
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
python-django-webtest is shipped in version 1.9.12.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-295=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
python311-django-webtest-1.9.12-bp156.2.1
References:
https://bugzilla.suse.com/1229551
1
0
SUSE-RU-2024:3178-1: important: Recommended update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-branding-SLE, PackageKit, libyui, yast2-pkg-bindings
by OPENSUSE-UPDATES 09 Sep '24
by OPENSUSE-UPDATES 09 Sep '24
09 Sep '24
# Recommended update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-
branding-SLE, PackageKit, libyui, yast2-pkg-bindings
Announcement ID: SUSE-RU-2024:3178-1
Rating: important
References:
* bsc#1081596
* bsc#1223094
* bsc#1224771
* bsc#1225267
* bsc#1226014
* bsc#1226030
* bsc#1226493
* bsc#1227205
* bsc#1227625
* bsc#1227793
* bsc#1228138
* bsc#1228206
* bsc#1228208
* bsc#1228420
* bsc#1228787
* bsc#222971
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that has 16 fixes can now be installed.
## Description:
This update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-branding-SLE,
PackageKit, libyui, yast2-pkg-bindings fixes the following issues:
* Make sure not to statically linked installed tools (bsc#1228787)
* MediaPluginType must be resolved to a valid MediaHandler (bsc#1228208)
* Export asSolvable for YAST (bsc#1228420)
* Export CredentialManager for legacy YAST versions (bsc#1228420)
* Fix 4 typos in zypp.conf
* Fix typo in the geoip update pipeline (bsc#1228206)
* Export RepoVariablesStringReplacer for yast2 (bsc#1228138)
* Removed dependency on external find program in the repo2solv tool
* Fix return value of repodata.add_solv()
* New SOLVER_FLAG_FOCUS_NEW flag
* Fix return value of repodata.add_solv() in the bindings
* Fix SHA-224 oid in solv_pgpvrfy
* Translation: updated .pot file.
* Conflict with python zypp-plugin < 0.6.4 (bsc#1227793)
* Fix int overflow in Provider
* Fix error reporting on repoindex.xml parse error (bsc#1227625)
* Keep UrlResolverPlugin API public
* Blacklist /snap executables for 'zypper ps' (bsc#1226014)
* Fix handling of buddies when applying locks (bsc#1225267)
* Fix readline setup to handle Ctrl-C and Ctrl-D correctly (bsc#1227205)
* Show rpm install size before installing (bsc#1224771)
* Install zypp/APIConfig.h legacy include
* Update soname due to RepoManager refactoring and cleanup
* Workaround broken libsolv-tools-base requirements
* Strip ssl_clientkey from repo urls (bsc#1226030)
* Remove protobuf build dependency
* Lazily attach medium during refresh workflows (bsc#1223094)
* Refactor RepoManager and add Service workflows
* Let_readline_abort_on_Ctrl-C (bsc#1226493)
* packages: add '\--system' to show @System packages (bsc#222971)
* Provide python3-zypp-plugin down to SLE12 (bsc#1081596)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3178=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3178=1 SUSE-2024-3178=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3178=1 SUSE-2024-3178=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Server-4.3-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-
SLES_SAP-15-SP4-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Retail-Branch-Server-4.3-2024-3178=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Proxy-4.3-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3178=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3178=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3178=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3178=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3178=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3178=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3178=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3178=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3178=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3178=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3178=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3178=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3178=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3178=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3178=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3178=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* PackageKit-branding-upstream-1.2.4-150400.3.20.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-aptitude-1.14.76-150400.3.57.16
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libzypp-debugsource-17.35.8-150400.3.85.1
* libyui-bindings-debugsource-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* perl-yui-debuginfo-4.3.7-150400.3.12.1
* python3-yui-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* ruby-yui-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* perl-solv-0.7.30-150400.3.27.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* ruby-yui-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* python3-yui-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* PackageKit-backend-dnf-1.2.4-150400.3.20.2
* libzypp-devel-doc-17.35.8-150400.3.85.1
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* perl-yui-4.3.7-150400.3.12.1
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libsolv-demo-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* python311-solv-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* python311-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-bindings-debuginfo-4.3.7-150400.3.12.1
* openSUSE Leap 15.4 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.20.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-64bit-1.2.4-150400.3.20.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libzypp-devel-doc-17.35.8-150500.6.13.1
* libzypp-debuginfo-17.35.8-150500.6.13.1
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.10.1
* libzypp-devel-17.35.8-150500.6.13.1
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* zypper-1.14.76-150500.6.6.15
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150500.6.6.15
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libzypp-debugsource-17.35.8-150500.6.13.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* zypper-debuginfo-1.14.76-150500.6.6.15
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libzypp-17.35.8-150500.6.13.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* openSUSE Leap 15.5 (noarch)
* zypper-log-1.14.76-150500.6.6.15
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-aptitude-1.14.76-150500.6.6.15
* PackageKit-branding-upstream-1.2.4-150400.3.20.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-needs-restarting-1.14.76-150500.6.6.15
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* perl-solv-0.7.30-150400.3.27.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* libsolv-demo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-dnf-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* python3-solv-0.7.30-150400.3.27.2
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* PackageKit-devel-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* openSUSE Leap 15.5 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.20.2
* openSUSE Leap 15.6 (noarch)
* zypper-aptitude-1.14.76-150600.10.6.13
* PackageKit-lang-1.2.8-150600.4.5.2
* PackageKit-branding-upstream-1.2.8-150600.4.5.2
* PackageKit-branding-SLE-12.0-150600.22.5.2
* zypper-needs-restarting-1.14.76-150600.10.6.13
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-log-1.14.76-150600.10.6.13
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* PackageKit-backend-dnf-debuginfo-1.2.8-150600.4.5.2
* typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.5.2
* libzypp-devel-17.35.8-150600.3.19.1
* libzypp-devel-doc-17.35.8-150600.3.19.1
* PackageKit-devel-1.2.8-150600.4.5.2
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* zypper-1.14.76-150600.10.6.13
* yast2-pkg-bindings-debuginfo-4.6.5-150600.3.6.1
* PackageKit-backend-zypp-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-1.2.8-150600.4.5.2
* PackageKit-devel-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-1.2.8-150600.4.5.2
* zypper-debugsource-1.14.76-150600.10.6.13
* PackageKit-1.2.8-150600.4.5.2
* zypper-debuginfo-1.14.76-150600.10.6.13
* PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.5.2
* PackageKit-backend-dnf-1.2.8-150600.4.5.2
* libzypp-debuginfo-17.35.8-150600.3.19.1
* libzypp-17.35.8-150600.3.19.1
* libpackagekit-glib2-devel-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.5.2
* yast2-pkg-bindings-debugsource-4.6.5-150600.3.6.1
* libzypp-debugsource-17.35.8-150600.3.19.1
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-32bit-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-64bit-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-64bit-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libsolv-demo-0.7.30-150400.3.27.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* python311-solv-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* libsolv-tools-base-0.7.30-150400.3.27.2
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* python311-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150500.6.6.15
* libzypp-debugsource-17.35.8-150500.6.13.1
* zypper-1.14.76-150500.6.6.15
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150500.6.13.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* openSUSE Leap Micro 5.5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64)
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le)
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Server 4.3 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise Desktop 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Proxy 4.3 (x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Proxy 4.3 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Desktop 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Desktop 15 SP6 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Desktop 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-debugsource-1.14.76-150500.6.6.15
* libzypp-debugsource-17.35.8-150500.6.13.1
* zypper-1.14.76-150500.6.6.15
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150500.6.13.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libzypp-debuginfo-17.35.8-150500.6.13.1
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.10.1
* libzypp-devel-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* zypper-1.14.76-150500.6.6.15
* libyui-qt-graph16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150500.6.6.15
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libzypp-debugsource-17.35.8-150500.6.13.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libzypp-17.35.8-150500.6.13.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.10.1
* Basesystem Module 15-SP5 (noarch)
* zypper-log-1.14.76-150500.6.6.15
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libzypp-devel-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* zypper-1.14.76-150600.10.6.13
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debuginfo-4.6.5-150600.3.6.1
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150600.10.6.13
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* zypper-debuginfo-1.14.76-150600.10.6.13
* libyui-qt-devel-4.5.3-150500.3.10.1
* libzypp-debuginfo-17.35.8-150600.3.19.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debugsource-4.6.5-150600.3.6.1
* libzypp-debugsource-17.35.8-150600.3.19.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* Basesystem Module 15-SP6 (noarch)
* zypper-needs-restarting-1.14.76-150600.10.6.13
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-log-1.14.76-150600.10.6.13
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* PackageKit-devel-1.2.4-150400.3.20.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* Desktop Applications Module 15-SP5 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* PackageKit-lang-1.2.4-150400.3.20.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpackagekit-glib2-18-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.5.2
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.5.2
* PackageKit-devel-1.2.8-150600.4.5.2
* PackageKit-1.2.8-150600.4.5.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.5.2
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* PackageKit-devel-debuginfo-1.2.8-150600.4.5.2
* PackageKit-backend-zypp-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-1.2.8-150600.4.5.2
* Desktop Applications Module 15-SP6 (noarch)
* PackageKit-lang-1.2.8-150600.4.5.2
* PackageKit-branding-SLE-12.0-150600.22.5.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1081596
* https://bugzilla.suse.com/show_bug.cgi?id=1223094
* https://bugzilla.suse.com/show_bug.cgi?id=1224771
* https://bugzilla.suse.com/show_bug.cgi?id=1225267
* https://bugzilla.suse.com/show_bug.cgi?id=1226014
* https://bugzilla.suse.com/show_bug.cgi?id=1226030
* https://bugzilla.suse.com/show_bug.cgi?id=1226493
* https://bugzilla.suse.com/show_bug.cgi?id=1227205
* https://bugzilla.suse.com/show_bug.cgi?id=1227625
* https://bugzilla.suse.com/show_bug.cgi?id=1227793
* https://bugzilla.suse.com/show_bug.cgi?id=1228138
* https://bugzilla.suse.com/show_bug.cgi?id=1228206
* https://bugzilla.suse.com/show_bug.cgi?id=1228208
* https://bugzilla.suse.com/show_bug.cgi?id=1228420
* https://bugzilla.suse.com/show_bug.cgi?id=1228787
* https://bugzilla.suse.com/show_bug.cgi?id=222971
1
0
09 Sep '24
# Recommended update for mksusecd
Announcement ID: SUSE-RU-2024:3177-1
Rating: important
References:
* bsc#1223982
* bsc#1227668
* jsc#PED-8374
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has two fixes can now be installed.
## Description:
This update for mksusecd fixes the following issues:
* Make some compression settings configurable (bsc#1223982, jsc#PED-8374).
* Update documentation.
* Fix UEFI image rebuild detection (bsc#1227668).
* Allow updating kernel in live initrd.
* Allow updating kernel in live root, support resizing live root.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3177=1 openSUSE-SLE-15.6-2024-3177=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3177=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mksusecd-debugsource-3.0-150600.3.9.3
* mksusecd-3.0-150600.3.9.3
* mksusecd-debuginfo-3.0-150600.3.9.3
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mksusecd-debugsource-3.0-150600.3.9.3
* mksusecd-3.0-150600.3.9.3
* mksusecd-debuginfo-3.0-150600.3.9.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223982
* https://bugzilla.suse.com/show_bug.cgi?id=1227668
* https://jira.suse.com/browse/PED-8374
1
0