openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2024
- 3 participants
- 344 discussions
openSUSE-RU-2024:0277-1: moderate: Recommended update for abcde
by maintenance@opensuse.org 03 Sep '24
by maintenance@opensuse.org 03 Sep '24
03 Sep '24
openSUSE Recommended Update: Recommended update for abcde
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0277-1
Rating: moderate
References: #1219527
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for abcde fixes the following issues:
- Fix arithmetic on non-octal track numbers (boo#1219527)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-277=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
abcde-2.9.3-bp156.5.3.1
References:
https://bugzilla.suse.com/1219527
1
0
03 Sep '24
# Security update for go1.21-openssl
Announcement ID: SUSE-SU-2024:3089-1
Rating: important
References:
* bsc#1212475
* bsc#1219988
* bsc#1220999
* bsc#1221000
* bsc#1221001
* bsc#1221002
* bsc#1221003
* bsc#1221400
* bsc#1224017
* bsc#1225973
* bsc#1225974
* bsc#1227314
* jsc#PED-1962
* jsc#SLE-18320
Cross-References:
* CVE-2023-45288
* CVE-2023-45289
* CVE-2023-45290
* CVE-2024-24783
* CVE-2024-24784
* CVE-2024-24785
* CVE-2024-24787
* CVE-2024-24789
* CVE-2024-24790
* CVE-2024-24791
CVSS scores:
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45289 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-45290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24783 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24787 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-24790 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-24791 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 10 vulnerabilities, contains two features and has two
security fixes can now be installed.
## Description:
This update for go1.21-openssl fixes the following issues:
* CVE-2024-24791: Fixed denial of service due to improper 100-continue
handling (bsc#1227314)
* CVE-2024-24789: Fixed mishandling of corrupt central directory record in
archive/zip (bsc#1225973)
* CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped
IPv6 addresses in net/netip (bsc#1225974)
* CVE-2024-24787: Fixed arbitrary code execution during build on darwin in
cmd/go (bsc#1224017)
* CVE-2023-45288: Fixed denial of service due to close connections when
receiving too many headers in net/http and x/net/http2 (bsc#1221400)
* CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies
on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000)
* CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in
net/http (bsc#1221001)
* CVE-2024-24783: Fixed denial of service on certificates with an unknown
public key algorithm in crypto/x509 (bsc#1220999)
* CVE-2024-24784: Fixed comments in display names are incorrectly handled in
net/mail (bsc#1221002)
* CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break
template escaping in html/template (bsc#1221003)
Other fixes: \- Update to version 1.21.13.1 cut from the go1.21-fips-release
(jsc#SLE-18320) \- Update to version 1.21.13 (bsc#1212475) \- Remove subpackage
go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962) \-
Ensure VERSION file is present in GOROOT as required by go tool dist and go tool
distpack (bsc#1219988)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3089=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3089=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3089=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3089=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2023-45289.html
* https://www.suse.com/security/cve/CVE-2023-45290.html
* https://www.suse.com/security/cve/CVE-2024-24783.html
* https://www.suse.com/security/cve/CVE-2024-24784.html
* https://www.suse.com/security/cve/CVE-2024-24785.html
* https://www.suse.com/security/cve/CVE-2024-24787.html
* https://www.suse.com/security/cve/CVE-2024-24789.html
* https://www.suse.com/security/cve/CVE-2024-24790.html
* https://www.suse.com/security/cve/CVE-2024-24791.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
* https://bugzilla.suse.com/show_bug.cgi?id=1219988
* https://bugzilla.suse.com/show_bug.cgi?id=1220999
* https://bugzilla.suse.com/show_bug.cgi?id=1221000
* https://bugzilla.suse.com/show_bug.cgi?id=1221001
* https://bugzilla.suse.com/show_bug.cgi?id=1221002
* https://bugzilla.suse.com/show_bug.cgi?id=1221003
* https://bugzilla.suse.com/show_bug.cgi?id=1221400
* https://bugzilla.suse.com/show_bug.cgi?id=1224017
* https://bugzilla.suse.com/show_bug.cgi?id=1225973
* https://bugzilla.suse.com/show_bug.cgi?id=1225974
* https://bugzilla.suse.com/show_bug.cgi?id=1227314
* https://jira.suse.com/browse/PED-1962
* https://jira.suse.com/browse/SLE-18320
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:3090-1
Rating: important
References:
* bsc#1229438
Cross-References:
* CVE-2024-44070
CVSS scores:
* CVE-2024-44070 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44070 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44070 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2024-44070: Fixed missing stream length check before TLV value is taken
in bgp_attr_encap (bsc#1229438)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3090=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3090=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3090=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3090=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3090=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3090=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3090=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3090=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3090=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3090=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3090=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3090=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
## References:
* https://www.suse.com/security/cve/CVE-2024-44070.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229438
1
0
03 Sep '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:3091-1
Rating: important
References:
* bsc#1228613
* bsc#1228693
* bsc#1228694
* bsc#1228695
* bsc#1228696
* bsc#1228697
* bsc#1228698
Cross-References:
* CVE-2024-40776
* CVE-2024-40779
* CVE-2024-40780
* CVE-2024-40782
* CVE-2024-40785
* CVE-2024-40789
* CVE-2024-40794
* CVE-2024-4558
CVSS scores:
* CVE-2024-40776 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-40776 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-40776 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-40779 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40780 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40782 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-40789 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40789 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
Update to version 2.44.3 (bsc#1228696 bsc#1228697 bsc#1228698):
* Fix web process cache suspend/resume when sandbox is enabled.
* Fix accelerated images dissapearing after scrolling.
* Fix video flickering with DMA-BUF sink.
* Fix pointer lock on X11.
* Fix movement delta on mouse events in GTK3.
* Undeprecate console message API and make it available in 2022 API.
* Fix several crashes and rendering issues.
* Security fixes: CVE-2024-40776, CVE-2024-40779, CVE-2024-40780,
CVE-2024-40782, CVE-2024-40785, CVE-2024-40789, CVE-2024-40794,
CVE-2024-4558.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3091=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3091=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3091=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3091=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3091=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3091=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3091=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3091=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3091=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3091=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkit-jsc-4-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-6.0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-2.44.3-150400.4.88.1
* webkit-jsc-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-2.44.3-150400.4.88.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit-jsc-6.0-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-devel-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-64bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150400.4.88.1
* webkit-jsc-4-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-6.0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-2.44.3-150400.4.88.1
* webkit-jsc-4.1-2.44.3-150400.4.88.1
* webkit-jsc-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-2.44.3-150400.4.88.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkit-jsc-6.0-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-devel-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-2.44.3-150400.4.88.1
* Basesystem Module 15-SP5 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* Desktop Applications Module 15-SP5 (noarch)
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* Development Tools Module 15-SP5 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Manager Proxy 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Proxy 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* SUSE Manager Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40776.html
* https://www.suse.com/security/cve/CVE-2024-40779.html
* https://www.suse.com/security/cve/CVE-2024-40780.html
* https://www.suse.com/security/cve/CVE-2024-40782.html
* https://www.suse.com/security/cve/CVE-2024-40785.html
* https://www.suse.com/security/cve/CVE-2024-40789.html
* https://www.suse.com/security/cve/CVE-2024-40794.html
* https://www.suse.com/security/cve/CVE-2024-4558.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228613
* https://bugzilla.suse.com/show_bug.cgi?id=1228693
* https://bugzilla.suse.com/show_bug.cgi?id=1228694
* https://bugzilla.suse.com/show_bug.cgi?id=1228695
* https://bugzilla.suse.com/show_bug.cgi?id=1228696
* https://bugzilla.suse.com/show_bug.cgi?id=1228697
* https://bugzilla.suse.com/show_bug.cgi?id=1228698
1
0
03 Sep '24
# Recommended update for dpdk
Announcement ID: SUSE-RU-2024:3092-1
Rating: moderate
References:
* bsc#1214724
* jsc#PED-8431
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that contains one feature and has one fix can now be installed.
## Description:
This update for dpdk fixes the following issue:
* Provided DPDK modules taint the kernel as unsupported (bsc#1214724,
jsc#PED-8431)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3092=1 openSUSE-SLE-15.5-2024-3092=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3092=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* libdpdk-20_0-19.11.10-150500.5.14.3
* libdpdk-20_0-debuginfo-19.11.10-150500.5.14.3
* dpdk-devel-19.11.10-150500.5.14.3
* dpdk-examples-19.11.10-150500.5.14.3
* dpdk-tools-19.11.10-150500.5.14.3
* dpdk-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-19.11.10-150500.5.14.3
* dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-examples-debuginfo-19.11.10-150500.5.14.3
* dpdk-debugsource-19.11.10-150500.5.14.3
* dpdk-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-debuginfo-19.11.10-150500.5.14.3
* dpdk-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* openSUSE Leap 15.5 (noarch)
* dpdk-thunderx-doc-19.11.10-150500.5.14.3
* dpdk-doc-19.11.10-150500.5.14.3
* openSUSE Leap 15.5 (aarch64)
* dpdk-thunderx-devel-19.11.10-150500.5.14.3
* dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-examples-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-tools-19.11.10-150500.5.14.3
* dpdk-thunderx-debugsource-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-19.11.10-150500.5.14.3
* dpdk-thunderx-examples-19.11.10-150500.5.14.3
* Legacy Module 15-SP5 (aarch64 ppc64le x86_64)
* libdpdk-20_0-19.11.10-150500.5.14.3
* libdpdk-20_0-debuginfo-19.11.10-150500.5.14.3
* dpdk-devel-19.11.10-150500.5.14.3
* dpdk-tools-19.11.10-150500.5.14.3
* dpdk-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-19.11.10-150500.5.14.3
* dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-debugsource-19.11.10-150500.5.14.3
* dpdk-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-debuginfo-19.11.10-150500.5.14.3
* dpdk-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* Legacy Module 15-SP5 (aarch64)
* dpdk-thunderx-devel-19.11.10-150500.5.14.3
* dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-debugsource-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-19.11.10-150500.5.14.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214724
* https://jira.suse.com/browse/PED-8431
1
0
03 Sep '24
# Recommended update for rust1.80
Announcement ID: SUSE-RU-2024:3093-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for rust1.80 fixes the following issues:
# Version 1.80.1 (2024-08-08)
* Fix miscompilation in the jump threading MIR optimization when comparing
floats
* Revert changes to the `dead_code` lint from 1.80.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3093=1 openSUSE-SLE-15.5-2024-3093=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3093=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3093=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3093=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (nosrc)
* rust1.80-test-1.80.1-150500.11.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* openSUSE Leap 15.6 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
1
0
03 Sep '24
# Security update for kubernetes1.26
Announcement ID: SUSE-SU-2024:3094-1
Rating: important
References:
* bsc#1062303
* bsc#1229008
* bsc#1229858
* bsc#1229867
* bsc#1229869
Cross-References:
* CVE-2023-39325
* CVE-2023-44487
* CVE-2024-24786
CVSS scores:
* CVE-2023-39325 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-39325 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities and has two security fixes can now
be installed.
## Description:
This update for kubernetes1.26 fixes the following issues:
Update kubernetes to version 1.26.15: \- CVE-2024-24786: Fixed infinite loop in
protojson.Unmarshal in golang-protobuf (bsc#1229867) \- CVE-2023-39325: Fixed a
flaw that can lead to a DoS due to a rapid stream resets causing excessive work.
This is also known as CVE-2023-44487. (bsc#1229869) \- CVE-2023-44487: Fixed
HTTP/2 Rapid Reset attack in net/http (bsc#1229869)
Other fixes:
\- Fixed packages required by kubernetes1.26-client installation (bsc#1229008)
\- Update go to version v1.22.5 (bsc#1229858) \- Add upstream patch for
reproducible builds (bsc#1062303)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3094=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3094=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3094=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3094=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3094=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3094=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3094=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3094=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3094=1
## Package List:
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-kubelet-1.26.15-150400.9.11.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.11.1
* kubernetes1.26-apiserver-1.26.15-150400.9.11.1
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.11.1
* kubernetes1.26-proxy-1.26.15-150400.9.11.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.11.1
* kubernetes1.26-scheduler-1.26.15-150400.9.11.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.11.1
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-kubelet-1.26.15-150400.9.11.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.11.1
* kubernetes1.26-apiserver-1.26.15-150400.9.11.1
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.11.1
* kubernetes1.26-proxy-1.26.15-150400.9.11.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.11.1
* kubernetes1.26-scheduler-1.26.15-150400.9.11.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.11.1
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.11.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39325.html
* https://www.suse.com/security/cve/CVE-2023-44487.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://bugzilla.suse.com/show_bug.cgi?id=1062303
* https://bugzilla.suse.com/show_bug.cgi?id=1229008
* https://bugzilla.suse.com/show_bug.cgi?id=1229858
* https://bugzilla.suse.com/show_bug.cgi?id=1229867
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0
03 Sep '24
# Security update for ucode-intel
Announcement ID: SUSE-SU-2024:3095-1
Rating: important
References:
* bsc#1229129
Cross-References:
* CVE-2023-42667
* CVE-2023-49141
* CVE-2024-24853
* CVE-2024-24980
* CVE-2024-25939
CVSS scores:
* CVE-2023-42667 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-42667 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-49141 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-49141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-24853 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-24853 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-24980 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N
* CVE-2024-24980 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
* CVE-2024-25939 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-25939 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for ucode-intel fixes the following issues:
* Intel CPU Microcode was updated to the 20240813 release (bsc#1229129)
* CVE-2024-24853: Security updates for INTEL-SA-01083
* CVE-2024-25939: Security updates for INTEL-SA-01118
* CVE-2024-24980: Security updates for INTEL-SA-01100
* CVE-2023-42667: Security updates for INTEL-SA-01038
* CVE-2023-49141: Security updates for INTEL-SA-01046 Other issues fixed:
* Update for functional issues. Refer to Intel Core Ultra Processor for
details.
* Update for functional issues. Refer to 3rd Generation Intel Xeon Processor
Scalable Family Specification Update for details.
* Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable
Processors Specification Update for details.
* Update for functional issues. Refer to 2nd Generation Intel Xeon Processor
Scalable Family Specification Update for details
* Update for functional issues. Refer to Intel Xeon D-2700 Processor
Specification Update for details.
* Update for functional issues. Refer to Intel Xeon E-2300 Processor
Specification Update for details.
* Update for functional issues. Refer to 13th Generation Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 12th Generation Intel Core Processor
Family for details.
* Update for functional issues. Refer to 11th Gen Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 10th Gen Intel Core Processor
Families Specification Update for details.
* Update for functional issues. Refer to 10th Generation Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 8th and 9th Generation Intel Core
Processor Family Spec Update for details.
* Update for functional issues. Refer to 8th Generation Intel Core Processor
Families Specification Update for details.
* Update for functional issues. Refer to 7th and 8th Generation Intel Core
Processor Specification Update for details.
* Update for functional issues. Refer to Intel Processors and Intel Core i3
N-Series for details.
* Update for functional issues. Refer to Intel Atom x6000E Series, and Intel
Pentium and Celeron N and J Series Processors for Internet of Things (IoT)
Applications for details. Updated Platforms: | Processor | Stepping |
F-M-S/PI | Old Ver | New Ver | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| AML-Y22 | H0 | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile |
AML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile | CFL-H
| R0 | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile | CFL-H/S | P0 |
06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 | CFL-H/S/E3 | U0 |
06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E |
CFL-S | B0 | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8 | CFL-S | P0 |
06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop | CFL-U43e | D0 |
06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile | CLX-SP | B1 |
06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2 | CML-H | R1 |
06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile | CML-S102 | Q0 |
06-a5-05/22 | 000000fa | 000000fc | Core Gen10 | CML-S62 | G1 | 06-a5-03/22
| 000000fa | 000000fc | Core Gen10 | CML-U42 | V0 | 06-8e-0c/94 | 000000fa |
000000fc | Core Gen10 Mobile | CML-U62 V1 | A0 | 06-a6-00/80 | 000000fa |
000000fe | Core Gen10 Mobile | CML-U62 V2 | K1 | 06-a6-01/80 | 000000fa |
000000fc | Core Gen10 Mobile | CML-Y42 | V0 | 06-8e-0c/94 | 000000fa |
000000fc | Core Gen10 Mobile | CPX-SP | A1 | 06-55-0b/bf | 07002802 |
07002904 | Xeon Scalable Gen3 | EHL | B1 | 06-96-01/01 | 00000019 | 0000001a
| Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E | ICL-D
| B0 | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx | ICL-U/Y |
D1 | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile | ICX-SP | Dx/M1
| 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3 | KBL-R U | Y0 |
06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile | KBL-U23e | J1 |
06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile | KBL-U/Y | H0 |
06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile | MTL | C-0 |
06-aa-04/e6 | 0000001c | 0000001e | Core Ultra Processor | RKL-S | B0 |
06-a7-01/02 | 0000005e | 00000062 | Core Gen11 | TGL | B0/B1 | 06-8c-01/80 |
000000b6 | 000000b8 | Core Gen11 Mobile | TGL-H | R0 | 06-8d-01/c2 |
00000050 | 00000052 | Core Gen11 Mobile | TGL-R | C0 | 06-8c-02/c2 |
00000036 | 00000038 | Core Gen11 Mobile | WHL-U | V0 | 06-8e-0c/94 |
000000fa | 000000fc | Core Gen8 Mobile | WHL-U | W0 | 06-8e-0b/d0 | 000000f4
| 000000f6 | Core Gen8 Mobile
* update to 20240531:
* Update for functional issues. Refer to Intel Pentium Silver and Intel
Celeron Processor Specification Update
* Updated Platforms: | Processor | Stepping | F-M-S/PI | Old Ver | New Ver |
Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| GLK | B0 | 06-7a-01/01 | 00000040 | 00000042 | Pentium Silver N/J5xxx,
Celeron N/J4xxx
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3095=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3095=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3095=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3095=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3095=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3095=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3095=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3095=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3095=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3095=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3095=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3095=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3095=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3095=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3095=1
## Package List:
* openSUSE Leap Micro 5.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* openSUSE Leap 15.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* openSUSE Leap 15.6 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* Basesystem Module 15-SP5 (x86_64)
* ucode-intel-20240813-150200.44.1
* Basesystem Module 15-SP6 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Proxy 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Server 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Enterprise Storage 7.1 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20240813-150200.44.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42667.html
* https://www.suse.com/security/cve/CVE-2023-49141.html
* https://www.suse.com/security/cve/CVE-2024-24853.html
* https://www.suse.com/security/cve/CVE-2024-24980.html
* https://www.suse.com/security/cve/CVE-2024-25939.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229129
1
0
03 Sep '24
# Recommended update for kubernetes1.25
Announcement ID: SUSE-RU-2024:3096-1
Rating: moderate
References:
* bsc#1229008
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for kubernetes1.25 fixes the following issues:
* Fix dependencies installation (bsc#1229008)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3096=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3096=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3096=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3096=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3096=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-kubeadm-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-1.25.16-150400.9.13.1
* kubernetes1.25-scheduler-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-common-1.25.16-150400.9.13.1
* kubernetes1.25-apiserver-1.25.16-150400.9.13.1
* kubernetes1.25-proxy-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-controller-manager-1.25.16-150400.9.13.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.25-client-bash-completion-1.25.16-150400.9.13.1
* kubernetes1.25-client-fish-completion-1.25.16-150400.9.13.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-kubeadm-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-1.25.16-150400.9.13.1
* kubernetes1.25-scheduler-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-common-1.25.16-150400.9.13.1
* kubernetes1.25-apiserver-1.25.16-150400.9.13.1
* kubernetes1.25-proxy-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-controller-manager-1.25.16-150400.9.13.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.25-client-bash-completion-1.25.16-150400.9.13.1
* kubernetes1.25-client-fish-completion-1.25.16-150400.9.13.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229008
1
0
03 Sep '24
# Security update for kubernetes1.28
Announcement ID: SUSE-SU-2024:3097-1
Rating: important
References:
* bsc#1229858
* bsc#1229867
* bsc#1229869
Cross-References:
* CVE-2023-39325
* CVE-2023-44487
* CVE-2023-45288
* CVE-2024-24786
CVSS scores:
* CVE-2023-39325 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-39325 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for kubernetes1.28 fixes the following issues:
Update kubernetes to version 1.28.13: \- CVE-2024-24786: Fixed infinite loop in
protojson.Unmarshal in golang-protobuf (bsc#1229867) \- CVE-2023-39325: Fixed a
flaw that can lead to a DoS due to a rapid stream resets causing excessive work.
This is also known as CVE-2023-44487. (bsc#1229869) \- CVE-2023-45288: Fixed
denial of service due to close connections when receiving too many headers in
net/http and x/net/http2 (bsc#1229869) \- CVE-2023-44487: Fixed HTTP/2 Rapid
Reset attack in net/http (bsc#1229869)
Other fixes: \- Update go to version v1.22.5 (bsc#1229858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3097=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3097=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3097=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3097=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3097=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3097=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3097=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3097=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3097=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-proxy-1.28.13-150400.9.8.1
* kubernetes1.28-controller-manager-1.28.13-150400.9.8.1
* kubernetes1.28-scheduler-1.28.13-150400.9.8.1
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-common-1.28.13-150400.9.8.1
* kubernetes1.28-apiserver-1.28.13-150400.9.8.1
* kubernetes1.28-kubeadm-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-1.28.13-150400.9.8.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.28-client-bash-completion-1.28.13-150400.9.8.1
* kubernetes1.28-client-fish-completion-1.28.13-150400.9.8.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-proxy-1.28.13-150400.9.8.1
* kubernetes1.28-controller-manager-1.28.13-150400.9.8.1
* kubernetes1.28-scheduler-1.28.13-150400.9.8.1
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-common-1.28.13-150400.9.8.1
* kubernetes1.28-apiserver-1.28.13-150400.9.8.1
* kubernetes1.28-kubeadm-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-1.28.13-150400.9.8.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.28-client-bash-completion-1.28.13-150400.9.8.1
* kubernetes1.28-client-fish-completion-1.28.13-150400.9.8.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39325.html
* https://www.suse.com/security/cve/CVE-2023-44487.html
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229858
* https://bugzilla.suse.com/show_bug.cgi?id=1229867
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0